Presentation | 2005-07-21 On Security of Superelliptic Curves and C_ Tsutomu IIJIMA, Mahoro SHIMURA, Jinhui CHAO, Shigeo TSUJII, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | The GHS Weil descent attack by Gaudry, Hess and Smart was originally proposed to elliptic curves over finite fields of characteristic two. In this paper, we consider GHS Weil descent attacks to algebraic curves whose function fields are Galois extensions of the rational function field. Lower bounds of genera of the function fields of their Weil restrictions are obtained when the function fields of the curves are tame Galois extensions. This class of curves can be divided into cyclic Galois extensions which contain superelliptic curves as a special case and non-cyclic Galois extensions which contain C_ |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | GHS Weil descent attack / superelliptic curves / C_ |
Paper # | ISEC2005-16,SITE2005-14 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2005/7/14(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | ENG |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | On Security of Superelliptic Curves and C_ |
Sub Title (in English) | |
Keyword(1) | GHS Weil descent attack |
Keyword(2) | superelliptic curves |
Keyword(3) | C_ |
Keyword(4) | function fields |
Keyword(5) | Pollard's rho algorithm |
Keyword(6) | Gaudry's algorithm |
Keyword(7) | Adleman-DeMarrais-Huang algorithm |
1st Author's Name | Tsutomu IIJIMA |
1st Author's Affiliation | Chuo University() |
2nd Author's Name | Mahoro SHIMURA |
2nd Author's Affiliation | Chuo University |
3rd Author's Name | Jinhui CHAO |
3rd Author's Affiliation | Chuo University |
4th Author's Name | Shigeo TSUJII |
4th Author's Affiliation | Institute of Information Security |
Date | 2005-07-21 |
Paper # | ISEC2005-16,SITE2005-14 |
Volume (vol) | vol.105 |
Number (no) | 193 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |