Beaver, Cheryl L.; Gemmell, Peter S.; Johnston, Anna M.; Neumann, William On the cryptographic value of the \(q^{th}\) root problem. (English) Zbl 1014.94553 Varadharajan, Vijay (ed.) et al., Information and communication security. 2nd international conference, ICICS ’99, Sydney, Australia, November 9-11, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1726, 135-142 (1999). MSC: 94A60 11Y16 PDF BibTeX XML Cite \textit{C. L. Beaver} et al., Lect. Notes Comput. Sci. 1726, 135--142 (1999; Zbl 1014.94553)
Brickell, E. F.; Moore, J. H. Some remarks on the Herlestam-Johannesson algorithm for computing logarithms over \(GF(2^ P)\). (English) Zbl 0554.12012 Advances in cryptology, Proc. Workshop, Santa Barbara/Calif. 1982, 15-19 (1983). Reviewer: H.J.Godwin MSC: 11T06 94B35 68Q25 PDF BibTeX XML