Key points are not available for this paper at this time.
A cryptographic system is described which is secure if and only if computing logarithms over GF (p) is infeasible. Previously published algorithms for computing this function require O (p^1/2) complexity in both time and space. An improved algorithm is derived which requires O = (^2 p) complexity if p - 1 has only small prime factors. Such values of p must be avoided in the cryptosystem. Constructive uses for the new algorithm are also described.
Building similarity graph...
Analyzing shared references across papers
Loading...
S.C. Pohlig
Martin E. Hellman
IEEE Transactions on Information Theory
Stanford University
Massachusetts Institute of Technology
MIT Lincoln Laboratory
Building similarity graph...
Analyzing shared references across papers
Loading...
Pohlig et al. (Sun,) studied this question.
www.synapsesocial.com/papers/6a08ab4f7de338f10b10e705 — DOI: https://doi.org/10.1109/tit.1978.1055817