Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Edlyn Teske is active.

Publication


Featured researches published by Edlyn Teske.


Journal of Cryptology | 2010

A Taxonomy of Pairing-Friendly Elliptic Curves

David Mandell Freeman; Michael Scott; Edlyn Teske

Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairing-based cryptographic systems. Such “pairing-friendly” curves are rare and thus require specific constructions. In this paper we give a single coherent framework that encompasses all of the constructions of pairing-friendly elliptic curves currently existing in the literature. We also include new constructions of pairing-friendly curves that improve on the previously known constructions for certain embedding degrees. Finally, for all embedding degrees up to 50, we provide recommendations as to which pairing-friendly curves to choose to best satisfy a variety of performance and security requirements.


Mathematics of Computation | 2000

On random walks for Pollard's RHO method

Edlyn Teske

We consider Pollards rho method for discrete logarithm computation. Usually, in the analysis of its running time the assumption is made that a random walk in the underlying group is simulated. We show that this assumption does not hold for the walk originally suggested by Pollard: its performance is worse than in the random case. We study alternative walks that can be efficiently applied to compute discrete logarithms. We introduce a class of walks that lead to the same performance as expected in the random case. We show that this holds for arbitrarily large prime group orders, thus making Pollards rho method for prime group orders about 20% faster than before.


Designs, Codes and Cryptography | 2000

Analysis of the Xedni Calculus Attack

Michael J. Jacobson; Neal Koblitz; Joseph H. Silverman; Andreas Stein; Edlyn Teske

AbstractThe xedni calculus attack on the elliptic curve discrete logarithm problem (ECDLP) involves lifting points from the finite field


the cryptographers’ track at the rsa conference | 2004

Weak Fields for ECC

Alfred Menezes; Edlyn Teske; Annegret Weng


selected areas in cryptography | 2002

On Some Attacks on Multi-prime RSA

M. Jason Hinek; Mo King Low; Edlyn Teske

{\mathbb{F}}_p


Journal of Cryptology | 2006

An Elliptic Curve Trapdoor System

Edlyn Teske


Mathematics of Computation | 1998

A space efficient algorithm for group structure computation

Edlyn Teske

to the rational numbers


Lms Journal of Computation and Mathematics | 2002

Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree

Markus Maurer; Alfred Menezes; Edlyn Teske


Mathematics of Computation | 2002

Explict bounds and heuristics on class numbers in hyperelliptic function fields

Andreas Stein; Edlyn Teske

{\mathbb{Q}}


IACR Cryptology ePrint Archive | 2013

Solving the Elliptic Curve Discrete Logarithm Problem Using Semaev Polynomials, Weil Descent and Gröbner Basis Methods – An Experimental Study

Michael Shantz; Edlyn Teske

Collaboration


Dive into the Edlyn Teske's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mo King Low

University of Waterloo

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Koray Karabina

Florida Atlantic University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge