Cryptography over Sextic Extension with Cubic Subfield
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32797
Cryptography over Sextic Extension with Cubic Subfield

Authors: A. Chillali, M. Sahmoudi

Abstract:

In this paper, we will give a cryptographic application over the integral closure O_Lof sextic extension L, namely L is an extension of Q of degree 6 in the form Q(a,b), which is a rational quadratic and monogenic extension over a pure monogenic cubic subfield K generated by a who is a root of monic irreducible polynomial of degree 2 andb is a root of irreducible polynomial of degree 3.

Keywords: Integral bases, Cryptography, Discrete logarithm problem.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1338234

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2199

References:


[1] M. E. Charkani and M. Sahmoudi, Sextic Extension With Cubic subfield, JP journal of algebra, Number theory and applications, vol. 34, No. 2, p. 139-150, 2014.
[2] M. E. Charkani and O. Lahlou, On Dedekind's criterion and monogenicity over Dedekind rings, Int. J. of Math. and Math. Sci. 2003 (7) (2003) 4455_4464.
[3] A. Chillali, Cryptography over elliptic curve of the ring, World Academy of science Engineering and Technology,78 (2011),pp.848-850.
[4] H. Cohen, A Course in Computational Algebraic Number theory, GTM vol. 138 (Springer Verlag, Berlin, 1996).
[5] K. Koblitz, “Elliptic curve cryptosystem”, Mathematies of computation., 48: 203-209, 1987.
[6] A. J. Menezes, Elliptic curve public key cryptosystems., Kluwer Academic Publishers, 1993.
[7] V. S. Miller, “Use of elliptic curves in cryptography”, In Crypto’85, p: 417-426, 1986.
[8] W. Diffie and M. E. Hellman, “New Directions in Cryptography,” IEEE Transactions on information theory, vol. it-22, No. 6, November 1976.