{"id":"https://openalex.org/W3210434013","doi":"https://doi.org/10.1007/s10623-021-00966-5","title":"Improving the Gaudry\u2013Schost algorithm for multidimensional discrete logarithms","display_name":"Improving the Gaudry\u2013Schost algorithm for multidimensional discrete logarithms","publication_year":2021,"publication_date":"2021-10-29","ids":{"openalex":"https://openalex.org/W3210434013","doi":"https://doi.org/10.1007/s10623-021-00966-5","mag":"3210434013"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-021-00966-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-021-00966-5","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060342416","display_name":"Haoxuan Wu","orcid":"https://orcid.org/0000-0002-5754-5867"},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Haoxuan Wu","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","School of Cyber Science and Technology, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103179935","display_name":"Jincheng Zhuang","orcid":null},"institutions":[{"id":"https://openalex.org/I154099455","display_name":"Shandong University","ror":"https://ror.org/0207yh398","country_code":"CN","type":"education","lineage":["https://openalex.org/I154099455"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I80143920","display_name":"Shandong University of Science and Technology","ror":"https://ror.org/04gtjhw98","country_code":"CN","type":"education","lineage":["https://openalex.org/I80143920"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jincheng Zhuang","raw_affiliation_strings":["Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","School of Cyber Science and Technology, Shandong University, Qingdao, China","Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China"],"affiliations":[{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I154099455"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, 266237, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"School of Cyber Science and Technology, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I80143920"]},{"raw_affiliation_string":"Key Laboratory of Cryptologic Technology and Information Security, Ministry of Education, Shandong University, Qingdao, China","institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I154099455"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5103179935"],"corresponding_institution_ids":["https://openalex.org/I154099455","https://openalex.org/I4210132990","https://openalex.org/I80143920"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":null,"fwci":0.14,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.57259915,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"90","issue":"1","first_page":"107","last_page":"119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.9973999857902527,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/discrete-logarithm","display_name":"Discrete logarithm","score":0.8436366319656372},{"id":"https://openalex.org/keywords/logarithm","display_name":"Logarithm","score":0.8013330101966858},{"id":"https://openalex.org/keywords/heuristic","display_name":"Heuristic","score":0.6326333284378052},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.4823245704174042},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.4721897840499878},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.43189889192581177},{"id":"https://openalex.org/keywords/asymptotically-optimal-algorithm","display_name":"Asymptotically optimal algorithm","score":0.42953428626060486},{"id":"https://openalex.org/keywords/iterated-logarithm","display_name":"Iterated logarithm","score":0.4265732765197754},{"id":"https://openalex.org/keywords/discrete-mathematics","display_name":"Discrete mathematics","score":0.40180081129074097},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4014471769332886},{"id":"https://openalex.org/keywords/mathematical-optimization","display_name":"Mathematical optimization","score":0.23074385523796082},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.08585089445114136}],"concepts":[{"id":"https://openalex.org/C173259116","wikidata":"https://www.wikidata.org/wiki/Q864003","display_name":"Discrete logarithm","level":4,"score":0.8436366319656372},{"id":"https://openalex.org/C39927690","wikidata":"https://www.wikidata.org/wiki/Q11197","display_name":"Logarithm","level":2,"score":0.8013330101966858},{"id":"https://openalex.org/C173801870","wikidata":"https://www.wikidata.org/wiki/Q201413","display_name":"Heuristic","level":2,"score":0.6326333284378052},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.4823245704174042},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.4721897840499878},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.43189889192581177},{"id":"https://openalex.org/C181789720","wikidata":"https://www.wikidata.org/wiki/Q4812191","display_name":"Asymptotically optimal algorithm","level":2,"score":0.42953428626060486},{"id":"https://openalex.org/C130594498","wikidata":"https://www.wikidata.org/wiki/Q2028293","display_name":"Iterated logarithm","level":3,"score":0.4265732765197754},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.40180081129074097},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4014471769332886},{"id":"https://openalex.org/C126255220","wikidata":"https://www.wikidata.org/wiki/Q141495","display_name":"Mathematical optimization","level":1,"score":0.23074385523796082},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.08585089445114136},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/s10623-021-00966-5","is_oa":false,"landing_page_url":"https://doi.org/10.1007/s10623-021-00966-5","pdf_url":null,"source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W176147980","https://openalex.org/W258537497","https://openalex.org/W1522339149","https://openalex.org/W1646354800","https://openalex.org/W1927552788","https://openalex.org/W1957825227","https://openalex.org/W2008272678","https://openalex.org/W2013613544","https://openalex.org/W2019816098","https://openalex.org/W2029465569","https://openalex.org/W2065533565","https://openalex.org/W2078706208","https://openalex.org/W2090493866","https://openalex.org/W2101803085","https://openalex.org/W2108834246","https://openalex.org/W2137120266","https://openalex.org/W2138784757","https://openalex.org/W2156186849","https://openalex.org/W2168139972","https://openalex.org/W2732730430","https://openalex.org/W2789618043","https://openalex.org/W2805855693","https://openalex.org/W3021971524","https://openalex.org/W3110623908","https://openalex.org/W3157578321","https://openalex.org/W4250314891"],"related_works":["https://openalex.org/W2130361051","https://openalex.org/W1555245969","https://openalex.org/W2255063177","https://openalex.org/W2321282558","https://openalex.org/W2299507895","https://openalex.org/W1900540279","https://openalex.org/W2944491272","https://openalex.org/W2386654567","https://openalex.org/W2053219677","https://openalex.org/W2393744093"],"abstract_inverted_index":null,"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2026-03-27T14:29:43.386196","created_date":"2025-10-10T00:00:00"}
