b^{k}} can be defined for all integers k {\displaystyle k} , and the discrete logarithm log b ( a ) {\displaystyle \log _{b}(a)} is an integer k {\displaystyle...
17 KB (2,506 words) - 02:19, 27 April 2025
Discrete logarithm records are the best results achieved to date in solving the discrete logarithm problem, which is the problem of finding solutions x...
32 KB (3,413 words) - 11:40, 13 March 2025
Elliptic-curve cryptography (redirect from Elliptic curve discrete logarithm problem)
elliptic-curve-based protocols, the base assumption is that finding the discrete logarithm of a random elliptic curve element with respect to a publicly known...
39 KB (4,676 words) - 10:16, 27 April 2025
increases the difficulty for an adversary attempting to compute the discrete logarithm and compromise the shared secret. These two values are chosen in this...
48 KB (5,437 words) - 16:48, 22 April 2025
example, the complex logarithm is the multi-valued inverse of the complex exponential function. Similarly, the discrete logarithm is the multi-valued inverse...
98 KB (11,674 words) - 16:13, 4 May 2025
multiple similar algorithms for solving the factoring problem, the discrete logarithm problem, and the period-finding problem. "Shor's algorithm" usually...
40 KB (5,812 words) - 01:39, 10 May 2025
ElGamal encryption (redirect from Elgamal discrete logarithm cryptosystem)
(1985). "A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms" (PDF). IEEE Transactions on Information Theory. 31 (4): 469–472...
10 KB (1,473 words) - 11:12, 31 March 2025
algorithm is a probabilistic algorithm for computing discrete logarithms. Dedicated to the discrete logarithm in ( Z / q Z ) ∗ {\displaystyle (\mathbb {Z} /q\mathbb...
11 KB (1,720 words) - 04:38, 15 January 2024
computing the discrete logarithm. Currently there are several popular groups for which no algorithm to calculate the underlying discrete logarithm in polynomial...
14 KB (1,956 words) - 16:22, 30 March 2025
Modular exponentiation (redirect from Discrete exponential function)
for very large integers. On the other hand, computing the modular discrete logarithm – that is, finding the exponent e when given b, c, and m – is believed...
21 KB (2,802 words) - 21:02, 4 May 2025
Finite field (section Discrete logarithm)
the inverse operation, the discrete logarithm. This has been used in various cryptographic protocols, see Discrete logarithm for details. When the nonzero...
45 KB (7,535 words) - 18:07, 22 April 2025
Random self-reducibility (section Discrete logarithm)
and its logarithm can be computed with probability 1/poly(n) in polynomial time. Then loggx ≡ loggxgB - B (mod |G|) and the discrete logarithm is self-reducible...
6 KB (911 words) - 22:50, 27 April 2025
problem. The CDH assumption involves the problem of computing the discrete logarithm in cyclic groups. The CDH problem illustrates the attack of an eavesdropper...
6 KB (796 words) - 00:01, 8 March 2025
then the problem of solving discrete logarithm modulo p is in P. Therefore, for cryptosystems based on discrete logarithm, such as DSA, it is required...
6 KB (767 words) - 19:43, 12 February 2025
Pollard's kangaroo algorithm (category Logarithms)
lambda algorithm, see Naming below) is an algorithm for solving the discrete logarithm problem. The algorithm was introduced in 1978 by the number theorist...
10 KB (1,295 words) - 09:28, 22 April 2025
ciphers are based on the difficulty of factoring integers or the discrete logarithm problem, both of which can be solved by Shor's algorithm. In particular...
113 KB (12,412 words) - 05:18, 7 May 2025
based on the mathematical concept of modular exponentiation and the discrete logarithm problem. In a public-key cryptosystem, a pair of private and public...
16 KB (2,229 words) - 16:39, 21 April 2025
problems are intractable, such as the integer factorization or the discrete logarithm problems, so there are deep connections with abstract mathematics...
99 KB (10,975 words) - 20:28, 3 April 2025
problems: the integer factorization problem, the discrete logarithm problem or the elliptic-curve discrete logarithm problem. All of these problems could be easily...
63 KB (6,408 words) - 13:56, 6 May 2025
having selected it), unless that party can solve the elliptic curve discrete logarithm problem. Bob's private key is similarly secure. No party other than...
14 KB (2,168 words) - 17:07, 22 April 2025
integer factorization, discrete logarithm, and elliptic curve discrete logarithm. DL/ECKAS-DH1 and DL/ECKAS-DH2 (Discrete Logarithm/Elliptic Curve Key Agreement...
6 KB (629 words) - 03:54, 31 July 2024
algorithm for computing the discrete logarithm or order of an element in a finite abelian group by Daniel Shanks. The discrete log problem is of fundamental...
7 KB (1,061 words) - 19:23, 24 January 2025
the first whose security is based on the intractability of certain discrete logarithm problems. It is efficient and generates short signatures. It was covered...
9 KB (1,248 words) - 11:38, 15 March 2025
Binary logarithm Bode plot Henry Briggs Bygrave slide rule Cologarithm Common logarithm Complex logarithm Discrete logarithm Discrete logarithm records...
3 KB (230 words) - 13:13, 22 February 2025
computer science. The framework captures problems such as factoring, discrete logarithm, graph isomorphism, and the shortest vector problem. This makes it...
12 KB (2,031 words) - 13:15, 26 March 2025
based on the hardness of the discrete logarithm and related problems. However, both factoring and the discrete logarithm problem are known to be solvable...
24 KB (2,852 words) - 05:01, 2 May 2025
Emmanuel Thomé, and Paul Zimmermann announced the computation of a discrete logarithm modulo the 240-digit (795 bit) prime RSA-240 + 49204 (the first safe...
24 KB (2,777 words) - 13:26, 30 April 2025
algorithms, notably Shor's algorithm for factoring and computing the discrete logarithm, the quantum phase estimation algorithm for estimating the eigenvalues...
20 KB (3,302 words) - 15:43, 25 February 2025
digital signature scheme which is based on the difficulty of computing discrete logarithms. It was described by Taher Elgamal in 1985. The ElGamal signature...
8 KB (1,236 words) - 02:10, 12 February 2024
v t e Public-key cryptography Algorithms Theory Discrete logarithm cryptography Elliptic-curve cryptography Hash-based cryptography Non-commutative cryptography...
15 KB (1,472 words) - 21:44, 9 May 2025