军事学 >>> 军事学
搜索结果: 1-5 共查到军事学 GHS attack相关记录5条 . 查询时间(0.134 秒)
The GHS attack is known to solve discrete logarithm problems (DLP) in the Jacobian of a curve C_0 defined over the d degree extension field k_d of k:=GF(q) by mapping it to the DLP in the Jacobian of ...
The GHS attack is known as a method to map the discrete logarithm problem(DLP) in the Jacobian of a curve C_{0} defined over the d degree extension k_{d} of a finite field k to the DLP in the Jacobian...
The GHS attack is known as a method to map the discrete loga- rithm problem(DLP) in the Jacobian of a curve C0 defined over the d degree extension kd of a finite field k to the DLP in the Jacobian o...
In this paper, we present algorithms for implementation of the GHS attack to Elliptic curve cryptosystems (ECC). In particular, we consider two large classes of elliptic curves over cubic extension ...
A finite field K is said to be weak for elliptic curve cryp- tography if all instances of the discrete logarithm problem for all elliptic curves over K can be solved in significantly less time than ...

中国研究生教育排行榜-

正在加载...

中国学术期刊排行榜-

正在加载...

世界大学科研机构排行榜-

正在加载...

中国大学排行榜-

正在加载...

人 物-

正在加载...

课 件-

正在加载...

视听资料-

正在加载...

研招资料 -

正在加载...

知识要闻-

正在加载...

国际动态-

正在加载...

会议中心-

正在加载...

学术指南-

正在加载...

学术站点-

正在加载...