<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE raweb PUBLIC "-//INRIA//DTD " "raweb2.dtd">
<raweb xml:lang="en" year="2008">
  <identification id="tanc" isproject="true">
    <shortname>TANC</shortname>
    <projectName>Théorie Algorithmique des Nombres pour la Cryptologie</projectName>
    <theme>SYM</theme>
    <UR name="Saclay"/>
  </identification>
  <team id="uid1">
    <person key="tanc-2006-idm182960493376">
      <firstname>François</firstname>
      <lastname>Morain</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Enseignant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Professor at École polytechnique</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="tanc-2006-idm182960489552">
      <firstname>Andreas</firstname>
      <lastname>Enge</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CR1</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="spaces-2006-idm18803796560">
      <firstname>Thomas</firstname>
      <lastname>Houtmann</lastname>
      <affiliation>AutreEtablissementPublic</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CNRS/DGA until 2008-09-01</moreinfo>
    </person>
    <person key="tanc-2007-idm335718057152">
      <firstname>Luca</firstname>
      <lastname>De Feo</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>École polytechnique since 2007-09-01</moreinfo>
    </person>
    <person key="tanc-2007-idm335718054096">
      <firstname>Jean-François</firstname>
      <lastname>Biasse</lastname>
      <affiliation>AutreEtablissementPublic</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>DGA since 2007-09-01</moreinfo>
    </person>
    <person key="tanc-2006-idm182960480240">
      <firstname>Évelyne</firstname>
      <lastname>Rayssac</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>Assistant</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>École polytechnique</moreinfo>
    </person>
    <person key="codes-2006-idm111968686864">
      <firstname>Daniel</firstname>
      <lastname>Augot</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CR1</moreinfo>
      <hdr>oui</hdr>
    </person>
    <person key="tanc-2007-idm335718029328">
      <firstname>Ben</firstname>
      <lastname>Smith</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Chercheur</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>CR2</moreinfo>
    </person>
    <person key="tanc-2008-idm235749978160">
      <firstname>Morgan</firstname>
      <lastname>Barbier</lastname>
      <affiliation>UnivFr</affiliation>
      <categoryPro>PhD</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>École polytechnique since 2008-10-01</moreinfo>
    </person>
    <person key="tanc-2006-idm182960467600">
      <firstname>Jérôme</firstname>
      <lastname>Milan</lastname>
      <affiliation>INRIA</affiliation>
      <categoryPro>Technique</categoryPro>
      <research-centre>Saclay</research-centre>
      <moreinfo>Ingénieur de Développement Digiteo</moreinfo>
    </person>
  </team>
  <presentation id="uid2">
    <bodyTitle>Overall Objectives</bodyTitle>
    <subsection level="1" id="uid3">
      <bodyTitle>Main topics</bodyTitle>
      <moreinfo>
        <p><span class="smallcap" align="left">TANC</span>is located in the Laboratoire d'Informatique de l'École polytechnique (LIX). The project was created on 2003-03-10.</p>
      </moreinfo>
      <p>The aim of the 
      <span class="smallcap" align="left">TANC</span>project is to promote the study, implementation and use of robust and verifiable asymmetric cryptosystems based on algorithmic number theory.</p>
      <p>It is clear from this statement that we combine high-level mathematics and efficient programming. Our main area of competence and interest is that of algebraic curves over finite fields,
      most notably the computational aspects of these objects, that appear as a substitute of good old-fashioned cryptography based on modular arithmetic. One of the reasons for this change is that
      the key-size is much smaller for an equivalent security. We participate in the recent bio-diversity mood that tries to find substitutes for old-fashioned cryptosystems as the very famous RSA
      system (for Rivest/Shamir/Adleman), in case some attack would appear and destroy the products that employ it.</p>
      <p>Whenever possible, we produce certificates (proofs) of validity for the objects and systems we build. For instance, an elliptic curve has many invariants, and their values need to be proved,
      since they may be difficult to compute.</p>
      <p>Our research area includes:</p>
      <simplelist>
        <li id="uid4">
          <p noindent="true">Fundamental number theoretic algorithms: we are interested in primality proving algorithms based on elliptic curves, integer factorization, and the computation of
          discrete logarithms over finite fields. These problems lie at the heart of the security of arithmetic based cryptosystems.</p>
        </li>
        <li id="uid5">
          <p noindent="true">Algebraic curves over finite fields: the algorithmic problems that we tackle deal with the efficient computation of group laws on Jacobians of curves, evaluation of the
          cardinality of these objects, and the study of the security of the discrete logarithm problem in such groups. These topics are the crucial problems to be solved for potential use in real
          crypto-products.</p>
        </li>
        <li id="uid6">
          <p noindent="true">Complex multiplication: the theory of complex multiplication is a meeting point of algebra, complex analysis and algebraic geometry. Its applications range from primality
          proving to the efficient construction of elliptic and hyperelliptic curve-based cryptosystems.</p>
        </li>
        <li id="uid7">
          <p noindent="true">Pairings: The new number theoretic primitive of pairings (i.e. bilinear functions) on algebraic curves enables many novel applications, and poses algorithmic challenges
          concerning efficient implementation and the creation of secure instances.</p>
        </li>
        <li id="uid8">
          <p noindent="true">Decoding algorithms for Algebraic Geometric codes. The algorithmic knowledge of TANC will be used to accelerate the decoding algorithms, be they the classical one (up to
          half to the minimum distance), or new ones, which decode many more errors.</p>
        </li>
      </simplelist>
    </subsection>
    <subsection level="1" id="uid9">
      <bodyTitle>Exploratory topics</bodyTitle>
      <p>As described in the name of our project, we aim to provide robust primitives for asymmetric cryptography. In recent years, we have made several attempts at applying our knowledge to real
      life protocols. We are currently trying to promote the use of elliptic curves in environments where they could be useful, such as 
      <i>ad hoc</i>networks. We will also try to promote the use of AG codes, which are to coding theory what elliptic curve cryptography is to cryptology.</p>
    </subsection>
    <subsection level="1" id="uid10">
      <bodyTitle>Highlights of the year</bodyTitle>
      <p>B. Smith won the Best Paper award at EUROCRYPT 2008, the premier European conference in cryptology, for his work on discrete logarithms in genus 3  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid0" location="biblio" xyref="1773043069021"/>.</p>
      <p>A. Enge has won the Selfridge Prize of the Number Theory Foundation for the best paper 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid1" location="biblio" xyref="1773043069021"/>presented at ANTS-VIII in Banff, the main, biennial conference for algorithmic number theory.</p>
      <p>The team organized the C4 (Computations on Curves for Crypto and Coding) workshop, held on the 9th and 10th of June 2008 at the École polytechnique, bringing together leading researchers
      from France, the United States, Canada, Denmark, and the Netherlands.</p>
      <p>The team has contributed to the organisation of the CADO Workshop on Integer Factorization, held jointly with the CACAO project team in Nancy 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid2" location="biblio" xyref="1773043069021"/>.</p>
    </subsection>
  </presentation>
  <fondements id="uid11">
    <bodyTitle>Scientific Foundations</bodyTitle>
    <subsection level="1" id="uid12">
      <bodyTitle>General overview</bodyTitle>
      <keyword><KW controle="CRYPTOLOGY"/>Cryptology</keyword>
      <keyword><KW controle="ARITHMETIC"/>arithmetic</keyword>
      <p>Once considered beautiful but useless, arithmetic has proven incredibly efficient when asked to assist the creation of a new paradigm in cryptography. Classical cryptography was mainly
      concerned with 
      <i>symmetric techniques</i>: two principals wishing to communicate secretly had to share a common secret beforehand and this same secret was used both for encrypting the message and for
      decrypting it. This way of communication is efficient enough when traffic is low, or when the principals can meet prior to communication.</p>
      <p>It is clear that modern networks are too large for this to remain efficient any longer. Hence the need for cryptography without first contact. In theory, this is easy. Find two algorithms 
      <span class="math" align="left"><hi rend="it">E</hi></span>and 
      <span class="math" align="left"><hi rend="it">D</hi></span>that are reciprocal (i.e., 
      <span class="math" align="left"><hi rend="it">D</hi>( 
      <hi rend="it">E</hi>( 
      <hi rend="it">m</hi>)) = 
      <hi rend="it">m</hi></span>) and such that the knowledge of 
      <span class="math" align="left"><hi rend="it">E</hi></span>does not help in computing 
      <span class="math" align="left"><hi rend="it">D</hi></span>. Then 
      <span class="math" align="left"><hi rend="it">E</hi></span>is dubbed a public key available to anyone, and 
      <span class="math" align="left"><hi rend="it">D</hi></span>is the secret key, reserved to a user. When Alice wants to send an email to Bob, she uses his public key and can send him the encrypted message, without agreeing on a common key
      beforehand. Though simplified and somewhat idealized, this is the heart of asymmetric cryptology. Apart from confidentiality, modern cryptography provides good solutions to the signature
      problem, as well as some solutions for identifying all parties in protocols, thus enabling products to be usable on the 
      <span class="smallcap" align="left">Internet</span>(ssh, ssl/tls, etc.).</p>
      <p>Of course, everything has to be presented in the modern language of complexity theory: 
      <span class="math" align="left"><hi rend="it">E</hi></span>and 
      <span class="math" align="left"><hi rend="it">D</hi></span>must be computable in polynomial time; finding 
      <span class="math" align="left"><hi rend="it">D</hi></span>from 
      <span class="math" align="left"><hi rend="it">E</hi></span>alone should be possible only in, say, exponential time, without some secret knowledge.</p>
      <p>Now, where do difficult problems come from? Mostly from arithmetic, where we find problems such as the integer factorization problem and the discrete logarithm problem. Varying the groups
      appears to be important, since this provides some bio-diversity which is the key of the resistance to attacks from crypto-analysts. Among the groups proposed: finite fields, modular integers,
      algebraic curves, class groups, etc. All these now form cryptographic primitives that need to be assembled in protocols, and finally in commercial products.</p>
      <p>Our activity is concerned with the beginning of this process: we are interested in difficult problems arising in computational number theory and the efficient construction of these
      primitives. 
      <span class="smallcap" align="left">TANC</span>concentrates on modular arithmetic, finite fields and algebraic curves.</p>
      <p>We have a strong well-known reputation of breaking records whatever the subject is: constructing systems or breaking them, including primality proving, class polynomials, modular equations,
      computing cardinalities of algebraic curves, discrete logs, etc. This means writing programs and putting in all the work needed to make them run for weeks or months. An important part of our
      task is now to transform record programs into ones that can solve everyday life problems for current sizes of the parameters.</p>
      <p>Efficiency is not our single concern. Certificates are again another one. By this, we mean that we provide proofs of the properties of the objects we build. The traditional example is that
      of prime numbers, where certificates were introduced by Pratt in 1974. These certificates might be difficult to build, yet they are easy to check (by customers, say). We know how to do this for
      elliptic curves, with the aim of establishing what we call an 
      <b>identity card</b>for a curve, including its cardinality together with the proof of its factorization, its group structure (with proven generators), discriminant (and factorization), and
      class number of the associated order. The theory is ready for this, algorithms not out of reach. This must be extended to other curves, and in several cases, the theory is almost ready or not
      at all, and algorithms still to be found. This is one of the main problems we have to tackle in 
      <span class="smallcap" align="left">TANC</span>.</p>
      <p>It is clear that more and more complex mathematics will be used in cryptology (see the recent algorithms that use 
      <span class="math" align="left"><hi rend="it">p</hi></span>-adic approaches). These cannot live if we do not implement them, and this is where we need more and more evolved algorithms, that are for the moment present in very rare mathematical
      systems, like 
      <span class="smallcap" align="left">Magma</span>that we use for this. Once the algorithms work in 
      <span class="smallcap" align="left">Magma</span>, it is customary to rewrite them in C or C++ to gain speed. Along the same lines, some of our C programs developped for our research (an old
      version of ECPP, some parts of discrete log computations, cardinality of curves) are now included in this system, as a result of our collaboration with the Sydney group.</p>
    </subsection>
    <subsection level="1" id="uid13">
      <bodyTitle>Algebraic curves over finite fields</bodyTitle>
      <p>One of the most used protocols is that of Diffie-Hellman that enables Alice and Bob to exchange a secret information over an insecure channel. Given a publicly known cyclic group 
      <span class="math" align="left"><hi rend="it">G</hi></span>of generator 
      <span class="math" align="left"><hi rend="it">g</hi></span>, Alice sends 
      <span class="math" align="left"><hi rend="it">g</hi><sup><hi rend="it">a</hi></sup></span>for a random 
      <span class="math" align="left"><hi rend="it">a</hi></span>to Bob, and Bob responds with a random 
      <span class="math" align="left"><hi rend="it">g</hi><sup><hi rend="it">b</hi></sup></span>. Both Alice and Bob can now compute 
      <span class="math" align="left"><hi rend="it">g</hi><sup><hi rend="it">a</hi><hi rend="it">b</hi></sup></span>and this is henceforth their common secret. Of course, this a schematic presentation, since real-life protocols based on this need more security properties. Being unable to recover 
      <span class="math" align="left"><hi rend="it">a</hi></span>from 
      <span class="math" align="left"><hi rend="it">g</hi><sup><hi rend="it">a</hi></sup></span>(the discrete log problem – 
      <i>DLP</i>) is a major concern for the security of the scheme, and groups for which the 
      <i>DLP</i>is difficult must be favored. Therefore, groups are important, and 
      <span class="smallcap" align="left">TANC</span>concentrates on algebraic curves, since they offer a very interesting alternative to finite fields, in which the 
      <i>DLP</i>can be broken by subexponential algorithms, whereas exponential time is required for curves. Thus a smaller key can be used using curves, and this is very interesting as far as
      limited powered devices are concerned.</p>
      <p>In order to build a cryptosystem based on an algebraic curve over a finite field, one needs to efficiently compute the group law (hence have a nice representation of the elements of the
      Jacobian of the curve). Next, computing the cardinality of the Jacobian is required, so that we can find generators of the group. Once the curve is built, one needs to test its security, for
      example how hard the discrete logarithm in this group is.</p>
      <subsection level="2" id="id60422">
        <bodyTitle>Effective group laws</bodyTitle>
        <p>A curve that interests us is typically defined over a finite field 
        <span class="math" align="left">GF ( 
        <hi rend="it">p</hi>
        <sup><hi rend="it">n</hi></sup>)</span>, where 
        <span class="math" align="left"><hi rend="it">p</hi></span>is the characteristic of the field.</p>
        <p>The points of an elliptic curve 
        <span class="math" align="left"><hi rend="it">E</hi></span>(of equation 
        <span class="math" align="left"><hi rend="it">y</hi><sup>2</sup>= 
        <hi rend="it">x</hi><sup>3</sup>+ 
        <hi rend="it">a</hi><hi rend="it">x</hi>+ 
        <hi rend="it">b</hi></span>, say) form an abelian group, that was thoroughly studied during the preceding millenium. Adding two points is usually done using the so-called 
        <i>chord-and-tangent</i>formulæ. When dealing with a genus 
        <span class="math" align="left"><hi rend="it">g</hi></span>curve (the elliptic case being 
        <span class="math" align="left"><hi rend="it">g</hi>= 1</span>), the associated group is the Jacobian (set of 
        <span class="math" align="left"><hi rend="it">g</hi></span>-tuples of points modulo an equivalence relation), an object of dimension 
        <span class="math" align="left"><hi rend="it">g</hi></span>. Points are replaced by polynomial ideals. This requires the help of tools from effective commutative algebra, such as Gröbner bases or Hermite normal forms.</p>
        <p>The great catalog of usable curves is now complete, as a result of the work of 
        <span class="smallcap" align="left">TANC</span>, notably in two ACI ( 
        <span class="smallcap" align="left">cryptocourbes</span>and 
        <span class="smallcap" align="left">cryptologie p-adique</span>) that are finished now.</p>
      </subsection>
      <subsection level="2" id="id60668">
        <bodyTitle>Cardinality</bodyTitle>
        <p>Once the group law is tractable, one has to find means of computing the cardinality of the group, which is not an easy task in general. Of course, this has to be done as fast as possible,
        if changing the group very frequently in applications is imperative.</p>
        <p>Two parameters enter the scene: the genus 
        <span class="math" align="left"><hi rend="it">g</hi></span>of the curve, and the characteristic 
        <span class="math" align="left"><hi rend="it">p</hi></span>of the underlying finite field. When 
        <span class="math" align="left"><hi rend="it">g</hi>= 1</span>and 
        <span class="math" align="left"><hi rend="it">p</hi></span>is large, the only current known algorithm for computing the number of points of 
        <span class="math" align="left"><hi rend="it">E</hi>/ GF ( 
        <hi rend="it">p</hi>)</span>is that of Schoof–Elkies–Atkin. Thanks to the works of the project, world-widespread implementations are able to build cryptographically strong curves in less than
        one minute on a standard PC. Recent improvements were made by F. Morain and P. Gaudry (CACAO), see 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid3" location="biblio" xyref="1773043069021"/>. The current record of SEA was established by F. Morain in 2007 for a prime 
        <span class="math" align="left"><hi rend="it">p</hi></span>of 2500 decimal digits (again compared to 500dd back in 1995), using the work in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid4" location="biblio" xyref="1773043069021"/>(see below), as well as 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid5" location="biblio" xyref="1773043069021"/>, in which a new approach to the eigenvalue computation is described and proven.</p>
        <p>When 
        <span class="math" align="left"><hi rend="it">p</hi></span>is small (one of the most interesting cases for hardware implementation in smart cards being 
        <span class="math" align="left"><hi rend="it">p</hi>= 2</span>) the best current methods use 
        <span class="math" align="left"><hi rend="it">p</hi></span>-adic numbers, following the breakthrough of T. Satoh with a method working for 
        <span class="math" align="left"><hi rend="it">p</hi><img width="14" height="24" align="middle" border="0" src="../../images/img_other_ge.png" alt="$ \ge$"/>5</span>. The first version of this algorithm for 
        <span class="math" align="left"><hi rend="it">p</hi>= 2</span>was proposed independently by M. Fouquet, P. Gaudry and R. Harley and by B. Skjernaa. J. -F. Mestre has designed the currently
        fastest algorithm using the arithmetico-geometric mean (AGM) approach. Developed by R. Harley and P. Gaudry, it led to new world records. Then, P. Gaudry combined this method
        together with other approaches, to make it competitive for cryptographic sizes 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid6" location="biblio" xyref="1773043069021"/>.</p>
        <p spacebefore="6.0pt">When 
        <span class="math" align="left"><hi rend="it">g</hi>&gt;1</span>and 
        <span class="math" align="left"><hi rend="it">p</hi></span>is large, polynomial time algorithms exist, but their implementation is not an easy task. P. Gaudry and É. Schost have modified the best existing algorithm so as to make it
        more efficient. They were able to build the first random cryptographically strong genus 2 curves defined over a large prime field 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid7" location="biblio" xyref="1773043069021"/>. To get one step further, one needs to use genus 2 analogues of modular equations. After a theoretical study 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid8" location="biblio" xyref="1773043069021"/>, they are now investigating the practical use of these equations.</p>
        <p>When 
        <span class="math" align="left"><hi rend="it">p</hi>= 2</span>, 
        <span class="math" align="left"><hi rend="it">p</hi></span>-adic algorithms led to striking new results. First, the AGM approach extends to the case 
        <span class="math" align="left"><hi rend="it">g</hi>= 2</span>and is competitive in practice (only three times slower than in the case 
        <span class="math" align="left"><hi rend="it">g</hi>= 1</span>). In another direction, Kedlaya has introduced a new approach, based on the Monsky-Washnitzer cohomology. His algorithm works originally when 
        <span class="math" align="left"><hi rend="it">p</hi>&gt;2</span>. P. Gaudry and N. Gürel implemented this algorithm and extended it to superelliptic curves, which had the effect of adding these curves to the list
        of those usable in cryptography.</p>
        <p>Closing the gap between small and large characteristic leads to pushing the 
        <span class="math" align="left"><hi rend="it">p</hi></span>-adic methods as far as possible. In this spirit, P. Gaudry and N. Gürel have adapted Kedlaya's algorithm and exhibited a linear complexity in 
        <span class="math" align="left"><hi rend="it">p</hi></span>, making it possible to reach a characteristic of around 1000 (see 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid9" location="biblio" xyref="1773043069021"/>). For larger 
        <span class="math" align="left"><hi rend="it">p</hi></span>'s, one can use the Cartier-Manin operator. Recently, A. Bostan, P. Gaudry and É. Schost have found a much faster algorithm than currently known ones 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid10" location="biblio" xyref="1773043069021"/>. Primes 
        <span class="math" align="left"><hi rend="it">p</hi></span>around 
        <span class="math" align="left">10 
        <sup>9</sup></span>are now doable.</p>
      </subsection>
      <subsection level="2" id="id61291">
        <bodyTitle>Computing isogenies</bodyTitle>
        <p>The core of the Schoof-Elkies-Atkin (SEA) algorithm that computes the cardinality of elliptic curves over finite fields consists in using the theory of isogenies to find small factors of
        division polynomials. SEA is still the method of choice for the large characteristic case, but no longer for small characteristics.</p>
        <p>Isogenies are also a tool for understanding the difficulty of the Discrete Log problem among classes of elliptic curves 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid11" location="biblio" xyref="1773043069021"/>. Recently, there appeared suggestions to use isogenies in a cryptographic context, replacing the multiplication
        on curves by the use of such morphisms 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid12" location="biblio" xyref="1773043069021"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid13" location="biblio" xyref="1773043069021"/>.</p>
        <p>Algorithms for computing isogenies are very well known and used in the large characteristic case. When the characteristic is small, three algorithms exist: two of these are due to
        Couveignes 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid14" location="biblio" xyref="1773043069021"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid15" location="biblio" xyref="1773043069021"/>, 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid16" location="biblio" xyref="1773043069021"/>and one to Lercier 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid17" location="biblio" xyref="1773043069021"/>.</p>
      </subsection>
      <subsection level="2" id="id61421">
        <bodyTitle>The discrete logarithm problem</bodyTitle>
        <p>The discrete logarithm problem is one of the major difficult problems that allow to build secure cryptosystems. It has essentially been proved equivalent to the computational
        Diffie–Hellman problem, which is closer to the actual security of many systems. For an arbitrary group of prime order 
        <span class="math" align="left"><hi rend="it">N</hi></span>, it can be solved by a generic, exponential algorithm using 
        <span class="math" align="left"><img align="middle" width="45" height="16" src="math_image_1.png" xylemeAttach="1" border="0" alt="Im1 ${\#920 (\sqrt N)}$"/></span>group operations. For elliptic curves, set aside some rare and easily avoidable instances, no faster algorithms are known.</p>
        <p>In higher genus curves, the algorithms with the best complexity create relations as smooth principal divisors on the curve and use linear algebra to deduce discrete logarithms, similarly
        to the quadratic sieve for factoring. The first such algorithm for high genus hyperelliptic curves with a heuristic complexity analysis is given in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid18" location="biblio" xyref="1773043069021"/>, and A. Enge has developed the first algorithm with a proven subexponential run time of 
        <span class="math" align="left"><hi rend="it">L</hi>(1/2)</span>in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid19" location="biblio" xyref="1773043069021"/>. Generalisations to further groups suggested for cryptography, in particular ideal class groups of imaginary
        quadratic number fields, are obtained by A. Enge and P. Gaudry in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid20" location="biblio" xyref="1773043069021"/>
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid21" location="biblio" xyref="1773043069021"/>. Proofs for arbitrary curves of large genus are given by J.-M. Couveignes 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid22" location="biblio" xyref="1773043069021"/>and F. Heß 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid23" location="biblio" xyref="1773043069021"/>.</p>
        <p>The existence of subexponential algorithms shows that high genus curves are less secure than, say, elliptic ones in cryptography. By analysing the same algorithms differently, concrete
        recommendations for key lengths can be obtained, an approach introduced by P. Gaudry in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid24" location="biblio" xyref="1773043069021"/>and pursued in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid25" location="biblio" xyref="1773043069021"/>. It turns out that elliptic curves and hyperelliptic curves of genus 2 are not affected, while the key
        lengths have to be increased in higher genus, for instance by 
        <span class="math" align="left">12 %</span>in genus 3.</p>
        <p>Using similar algorithms to those analysed in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid20" location="biblio" xyref="1773043069021"/>, C. Diem has shown in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid26" location="biblio" xyref="1773043069021"/>that non-hyperelliptic curves (of genus at least 3) are even less secure than hyperelliptic ones of the same
        genus. This effectively leaves elliptic and low genus hyperelliptic curves as potential sources for public-key cryptosystems.</p>
      </subsection>
      <subsection level="2" id="id61729">
        <bodyTitle>Pairings on algebraic curves</bodyTitle>
        <p>Algebraic curves have first been used in cryptography as a source for groups in which the discrete logarithm problem should be harder than in the multiplicative group of a finite field.
        Totally new applications stem from the use of structures proper to algebraic curves, the Tate and Weil pairings. These are bilinear maps that associate to two group elements, at least one of
        which is defined in an extension field, a root of unity in the same extension field. Among the first new cryptographic primitives were a tripartite Diffie–Hellman key exchange 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid27" location="biblio" xyref="1773043069021"/>and identity based encryption 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid28" location="biblio" xyref="1773043069021"/>. Subsequently, the number of articles concerned with pairings has exploded, and a specialised series of
        conferences has been inaugurated with Pairings 2007 in Tokyo, A. Enge being a member of the programme committees in 2007 and 2008.</p>
        <p>One of the most challenging problems related to pairing based cryptography is to find suitable curves, that are hidden like needles in a hay stack. Supersingular elliptic curves yield a
        rather limited supply of doubtful security. Using its expertise on complex multiplication, the TANC team has published one of the first two algorithms for finding pairing friendly ordinary
        curves for arbitrary field extension degrees in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid29" location="biblio" xyref="1773043069021"/>, the other one being developed in 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid30" location="biblio" xyref="1773043069021"/>.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid14">
      <bodyTitle>Complex multiplication</bodyTitle>
      <subsection level="2" id="id61823">
        <bodyTitle>Genus 1</bodyTitle>
        <p>Despite the achievements described above, random curves are sometimes difficult to use, since their cardinality is not easy to compute or useful instances are too rare to occur (curves for
        pairings for instance). In some cases, curves with special properties can be used. For instance curves with 
        <i>complex multiplication</i>(in brief CM), whose cardinalities are easy to compute. For example, the elliptic curve defined over 
        <span class="math" align="left"><hi rend="it">G</hi><hi rend="it">F</hi>( 
        <hi rend="it">p</hi>)</span>of equation 
        <span class="math" align="left"><hi rend="it">y</hi><sup>2</sup>= 
        <hi rend="it">x</hi><sup>3</sup>+ 
        <hi rend="it">x</hi></span>has cardinality 
        <span class="math" align="left"><hi rend="it">p</hi>+ 1-2 
        <hi rend="it">u</hi></span>, when 
        <span class="math" align="left"><hi rend="it">p</hi>= 
        <hi rend="it">u</hi><sup>2</sup>+ 
        <hi rend="it">v</hi><sup>2</sup></span>, and computing 
        <span class="math" align="left"><hi rend="it">u</hi></span>is easy.</p>
        <p>The CM theory for genus 1 is well known and dates back to the middle of the nineteenth century (Kronecker, Weber, etc.). Its algorithmic part is also well understood, and recently more
        work was done, largely by 
        <span class="smallcap" align="left">TANC</span>. Twenty years ago, this theory was applied by Atkin to the primality proving of arbitrary integers, yielding the ECPP algorithm developed ever
        since by F. Morain. Though the decision problem 
        <span class="smallcap" align="left">isPrime?</span>was shown to be in 
        <i>P</i>(by the 2002 work of Agrawal, Kayal, Saxena), practical primality proving of large random numbers is still done only with ECPP.</p>
        <p>These CM curves enabled A. Enge, R. Dupont and F. Morain to give an algorithm for building good curves that can be used in identity based cryptosystems 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid29" location="biblio" xyref="1773043069021"/>.</p>
        <p>CM curves are defined by algebraic integers, whose minimal polynomials have to be computed exactly, the coefficients being exact integers. The fastest algorithm to perform these
        computations requires a floating point evaluation of the roots of the polynomial to a high precision. F. Morain on the one hand and A. Enge (together with R. Schertz) on the
        other, have developed the use of new class invariants that characterize CM curves. The union of these two families is currently the best that can be achieved in the field (see 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid31" location="biblio" xyref="1773043069021"/>). Later, F. Morain and A. Enge have designed a fast method for the computation of the roots of this
        polynomial over a finite field using Galois theory 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid32" location="biblio" xyref="1773043069021"/>. These invariants, together with this new algorithm, are incorporated in the working version of the program
        ECPP.</p>
        <p>F. Morain analyzed a fast variant of ECPP, called fastECPP, which led him to gain one order of magnitude in the complexity of the problem (see 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid33" location="biblio" xyref="1773043069021"/>
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid34" location="biblio" xyref="1773043069021"/>), reaching heuristically 
        <span class="math" align="left"><img align="middle" width="84" height="16" src="math_image_2.png" xylemeAttach="2" border="0" alt="Im2 ${O({(logN)}^{4+\#1013 })}$"/></span>, compared to 
        <span class="math" align="left"><img align="middle" width="84" height="17" src="math_image_3.png" xylemeAttach="3" border="0" alt="Im3 ${O({(logN)}^{5+\#1013 })}$"/></span>for the basic version. By comparison, the best proven version of AKS 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid35" location="biblio" xyref="1773043069021"/>has complexity 
        <span class="math" align="left"><img align="middle" width="84" height="16" src="math_image_4.png" xylemeAttach="4" border="0" alt="Im4 ${O({(logN)}^{6+\#1013 })}$"/></span>and has not been implemented so far; the best randomized version 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid36" location="biblio" xyref="1773043069021"/>reaches the same 
        <span class="math" align="left"><img align="middle" width="84" height="16" src="math_image_2.png" xylemeAttach="2" border="0" alt="Im2 ${O({(logN)}^{4+\#1013 })}$"/></span>bound but suffers from memory problems and is not competitive yet. F. Morain implemented fastECPP and was able to prove the primality of 
        <span class="math" align="left">10, 000</span>decimal digit numbers 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid33" location="biblio" xyref="1773043069021"/>, as opposed to 
        <span class="math" align="left">5, 000</span>for the basic (historical) version. Continuously improving this algorithm, this led to new records in primality proving, some of which obtained
        with his co-authors J. Franke, T. Kleinjung and T. Wirth 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid37" location="biblio" xyref="1773043069021"/>who developed their own programs. F. Morain set the current world record to 20,562 decimal digits early June
        2006, as opposed to 15,071 two years before. This record was made possible by using an updated MPI-based implementation of the algorithm and its distribution process on a cluster of 64-bit
        bi-processors (AMD Opteron(tm) Processor 250 at 2.39 GHz). In 2007, another large number was proven to be prime, namely 
        <span class="math" align="left">(2 
        <sup>42737</sup>+ 1)/3</span>with 
        <span class="math" align="left">12, 865</span>decimal digits.</p>
        <p spacebefore="6.0pt">In his thesis, R. Dupont has investigated the complexity of the evaluation of some modular functions and forms (such as the elliptic modular function  
        <span class="math" align="left"><hi rend="it">j</hi></span>or the Dedekind eta function for example). High precision evaluation of such functions is at the core of algorithms to compute class polynomials (used in complex multiplication) or
        modular polynomials (used in the SEA elliptic curve point counting algorithm).</p>
        <p>Exploiting the deep connection between the arithmetic-geometric mean (AGM) and a special kind of modular forms known as theta constants, he devised an algorithm based on Newton iterations
        and the AGM that has quasi-optimal linear complexity. In order to certify the correctness of the result to a specified precision, a fine analysis of the algorithm and its complexity was
        necessary 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid38" location="biblio" xyref="1773043069021"/>.</p>
        <p>Using similar techniques, he has given a proven algorithm for the evaluation of the logarithm of complex numbers with quasi-optimal time complexity.</p>
      </subsection>
      <subsection level="2" id="id62634">
        <bodyTitle>Genus 2</bodyTitle>
        <p>The theory of Complex Multiplication also exists for non-elliptic curves, but is more intricate, and only recently can we dream to use them. Some of the recent results occurred as the work
        of R. Dupont (former member of TANC) in his thesis.</p>
        <p>R. Dupont has worked on adapting his algorithm to genus 2, which induces great theoretical and technical difficulties. He has studied a generalization of the AGM known as
        Borchardt sequences, has proven the convergence of these sequences in a general setting, and has determined the set of limits such sequences have in genus 2. He has then developped an
        algorithm for the fast evaluation of theta constants in genus 2, and as a byproduct obtains an algorithm to compute the Riemann matrix of a given hyperelliptic curve: given the equation
        of such a curve, it computes a lattice  
        <span class="math" align="left"><hi rend="it">L</hi></span>such that the Jacobian of the curve is isomorphic to 
        <span class="math" align="left"><img align="middle" width="26" height="13" src="math_image_5.png" xylemeAttach="5" border="0" alt="Im5 ${\#8450 /L}$"/></span>. These algorithms are both quasi-linear, and have been implemented (in 
        <span class="smallcap" align="left">C</span>, using the multiprecision package 
        <span class="smallcap" align="left">GMP</span>– see 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://gmplib.org/" location="extern" xyref="4194686874019">http:// 
        <allowbreak/>gmplib. 
        <allowbreak/>org/ 
        <allowbreak/></ref>).</p>
        <p>Using these implementations, R. Dupont has began computing modular polynomials for groups of the form  
        <span class="math" align="left"><img width="12" height="13" align="bottom" border="0" src="../../images/img_upper_gamma.png" alt="$ \upper_gamma$"/><sub>0</sub>( 
        <hi rend="it">p</hi>)</span>in genus 2 (these polynomials link the genus 2 
        <span class="math" align="left"><hi rend="it">j</hi></span>-invariants of 
        <span class="math" align="left"><hi rend="it">p</hi></span>-isogenous curves). He computed the modular polynomials for  
        <span class="math" align="left"><hi rend="it">p</hi>= 2</span>, which had never been done before, and did some partial computations for  
        <span class="math" align="left"><hi rend="it">p</hi>= 3</span>(results are available at  
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Regis.Dupont" location="extern" xyref="159696828024">http:// 
        <allowbreak/>www. 
        <allowbreak/>lix. 
        <allowbreak/>polytechnique. 
        <allowbreak/>fr/ 
        <allowbreak/>Labo/ 
        <allowbreak/>Regis. 
        <allowbreak/>Dupont</ref>).</p>
        <p>He also studied more theoretically the main ingredient used in his algorithms in genus 2, a procedure known as Borchardt sequences. In particular, he proved a theorem that
        parametrizes the set of all possible limits of Borchardt sequences starting with a fixed 4-tuple.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid15">
      <bodyTitle>Algebraic Geometry codes</bodyTitle>
      <p>There are many other applications of algorithmic methods on algebraic curves than simple cryptography. Daniel Augot plans to develop a new activity around algebraic geometry codes, in short
      AG codes, which are a very powerful family of codes, who often beat records on their parameters: they often offer the best correction capacity. The main topics of research is to accelerate the
      decoding algorithms of these codes, who have a slightly expensive cost 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid39" location="biblio" xyref="1773043069021"/>. A reference implementation would be of major interest, to help people comparing these codes with the Reed-Solomon
      codes.</p>
      <p>A breakthrought has been obtained by Guruswami and Sudan 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid40" location="biblio" xyref="1773043069021"/>for decoding these codes with many errors. Still, yet no implementation is avalaible, even for the most simple AG
      codes, which are the Hermitian codes. In this domain too, an objective is to produce a publicly available reference implementation.</p>
    </subsection>
  </fondements>
  <domaine id="uid16">
    <bodyTitle>Application Domains</bodyTitle>
    <subsection level="1" id="uid17">
      <bodyTitle>Telecom</bodyTitle>
      <p>Our main field of applications is clearly that of telecommunications. We participate in the protection of information. We are proficient on a theoretical level, as well as ready to develop
      applications using modern cryptologic techniques, with a main focus on elliptic curve cryptography. One potential application are cryptosystems in environments with limited resources as smart
      cards, mobile phones or 
      <i>ad hoc</i>networks.</p>
    </subsection>
  </domaine>
  <logiciels id="uid18">
    <bodyTitle>Software</bodyTitle>
    <subsection level="1" id="uid19">
      <bodyTitle>ECPP</bodyTitle>
      <p>F. Morain has been continuously improving his primality proving algorithm called ECPP, originally developed in the early '90. Binaries for version 6.4.5 are available since 2001 on his
      web page. Proving the primality of a 512 bit number requires less than a second on a GHz PC. His personal record is about 
      <span class="math" align="left">20, 000</span>decimal digits, with the fast version he started developing in 2003. Everything there is written in C, based on the 
      <span class="smallcap" align="left">GMP</span>package.</p>
    </subsection>
    <subsection level="1" id="uid20">
      <bodyTitle>mpc</bodyTitle>
      <p>The 
      <tt>mpc</tt>library, developed in C by A. Enge in collaboration with Ph. Théveny and P. Zimmermann, implements the basic operations on complex numbers in arbitrary precision,
      which can be tuned to the bit. This library is based on the multiprecision libraries 
      <span class="smallcap" align="left">GMP</span>and 
      <tt>mpfr</tt>. Each operation has a precise semantics, in such a way that the results do not depend on the underlying architecture. Several rounding modes are available. This software, licensed
      under the GNU Lesser General Public License (LGPL), can be downloaded freely from the URL 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.multiprecision.org/mpc/" location="extern" xyref="2093077411017">http:// 
      <allowbreak/>www. 
      <allowbreak/>multiprecision. 
      <allowbreak/>org/ 
      <allowbreak/>mpc/ 
      <allowbreak/></ref>.</p>
      <p>The library currently benefits from an Opération de développement logiciel of INRIA. The latest version 0.5 has been released in September 2008. A Debian package is available in the unstable
      distribution since October 2008. The perl wrapper Math::MPC ( 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://search.cpan.org/~sisyphus/Math-MPC/" location="extern" xyref="132085343014">http:// 
      <allowbreak/>search. 
      <allowbreak/>cpan. 
      <allowbreak/>org/ 
      <allowbreak/>~sisyphus/ 
      <allowbreak/>Math-MPC/ 
      <allowbreak/></ref>) is available on CPAN since version 0.4.6.</p>
      <p>The 
      <tt>mpc</tt>library is used in our team to build curves with complex multiplication and to compute modular polynomials (cf. Section  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#uid26" location="intern" xyref="1773043069021"/>), and it is 
      <i>de facto</i>incorporated in the ECPP program. It is used by the Magma Computational Algebra System ( 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://magma.maths.usyd.edu.au/magma/" location="extern" xyref="1617300179004">http:// 
      <allowbreak/>magma. 
      <allowbreak/>maths. 
      <allowbreak/>usyd. 
      <allowbreak/>edu. 
      <allowbreak/>au/ 
      <allowbreak/>magma/ 
      <allowbreak/></ref>) and by Trip ( 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.imcce.fr/Equipes/ASD/trip/trip.php" location="extern" xyref="3638812585008">http:// 
      <allowbreak/>www. 
      <allowbreak/>imcce. 
      <allowbreak/>fr/ 
      <allowbreak/>Equipes/ 
      <allowbreak/>ASD/ 
      <allowbreak/>trip/ 
      <allowbreak/>trip. 
      <allowbreak/>php</ref>), a symbolic-numeric system for celestial mechanics developed at Institut de Mécanique Céleste et de Calcul des Éphémérides</p>
    </subsection>
    <subsection level="1" id="uid21">
      <bodyTitle>mpfrcx</bodyTitle>
      <p>The 
      <tt>mpfrcx</tt>library is developed in C by A. Enge to implement the arithmetic of univariate polynomials with floating point coefficients of arbitrary precision, be they real ( 
      <tt>mpfr</tt>) or complex ( 
      <tt>mpc</tt>). The first version 0.1, published in October 2007 and available at 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Andreas.Enge/Software.html" location="extern" xyref="516941777023">http:// 
      <allowbreak/>www. 
      <allowbreak/>lix. 
      <allowbreak/>polytechnique. 
      <allowbreak/>fr/ 
      <allowbreak/>Labo/ 
      <allowbreak/>Andreas. 
      <allowbreak/>Enge/ 
      <allowbreak/>Software. 
      <allowbreak/>html</ref>, contains the functionality needed for the author's complex multiplication program. Advanced asymptotically fast algorithms have been implemented, such as Karatsuba and
      Toom–Cook multiplication, various flavours of the FFT and division with remainder by Newton iterations. Special algorithms of symbolic computation such as fast multievaluation are also
      available.</p>
      <p>Publishing 
      <tt>mpfrcx</tt>is part of an ongoing effort to make A. Enge's program for building elliptic curves with complex multiplication available. This program is a very important building block
      for cryptographic purposes as well as for primality proving (fastECPP).</p>
    </subsection>
    <subsection level="1" id="uid22">
      <bodyTitle>TIFA</bodyTitle>
      <p>We have hired J. Milan as 
      <i>ingénieur associé</i>to help us with our programs. He first spent some time making a tour of publicly available platforms implementing the IEEE P-1363 cryptography standards. Following this
      work, it appeared not interesting to add a new one to the list, and he switched to one of our other themes, namely writing integer factorization software for which the results can be
      guaranteed.</p>
      <p>However, besides this quite daunting task, we have a more pragmatic, twofold-interest in fast factorization implementations for small numbers.</p>
      <simplelist>
        <li id="uid23">
          <p noindent="true">Our first motivation is directly related to the ANR CADO project 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid2" location="biblio" xyref="1773043069021"/>we are involved in, together with other teams such as the INRIA project-team CACAO. The objective of the CADO
          project is to implement an optimized and distributed implementation of the Number Field Sieve (NFS), asymptotically the fastest integer factorization algorithm currently known. This
          algorithm needs to factor a lot of much smaller integers (about 80 bits for current factorization records). Since a recursive application of the NFS would be totally inefficient in
          practice, there is indeed a need for routines better suited to factor this wealth of smaller by-products.</p>
        </li>
        <li id="uid24">
          <p noindent="true">Our second motivation lies in our long-term commitment to produce identity cards for elliptic curves in order to select those curves with the needed properties for
          cryptographic use. Such an identification would require the knowledge of the factorization of the order of the curve (about 200 bits for cryptographic use).</p>
        </li>
      </simplelist>
      <p>Hence, J. Milan is still actively developing the so-called TIFA library (short for Tools for Integer FActorization). TIFA is made up of a base library written in C99 and using the GMP
      library, together with stand-alone factorization programs and a basic benchmarking framework to assess the performance of the relative algorithms.</p>
      <p>During the past year, TIFA has gone through a significant code refactoring aimed at facilitating its extensibility. Aside from optimizations made to the base library, several factorization
      algorithms were also added. As of september 2007, the following algorithms have been implemented:</p>
      <table rend="inline">
        <tr style="">
          <td style="text-align:left;" halign="left">CFRAC</td>
          <td style="text-align:left;" halign="left">(Continued FRACtion factorization 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid41" location="biblio" xyref="1773043069021"/>)</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">ECM</td>
          <td style="text-align:left;" halign="left">(Elliptic Curve Method)</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">Fermat</td>
          <td style="text-align:left;" halign="left">(McKee's “fast” variant of Fermat's algorithm 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid42" location="biblio" xyref="1773043069021"/>)</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">QS</td>
          <td style="text-align:left;" halign="left">(Quadratic Sieve 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid43" location="biblio" xyref="1773043069021"/>)</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">SIQS</td>
          <td style="text-align:left;" halign="left">(Self-Initializing Quadratic Sieve 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid43" location="biblio" xyref="1773043069021"/>)</td>
        </tr>
        <tr style="">
          <td style="text-align:left;" halign="left">SQUFOF</td>
          <td style="text-align:left;" halign="left">(SQUare FOrm Factorization 
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid44" location="biblio" xyref="1773043069021"/>)</td>
        </tr>
        <caption/>
      </table>
      <p spacebefore="11.38092pt"/>
      <p>In particular, a significant effort was made to fine tune the SQUFOF implementation for small (at most) double-precision numbers. We believe that TIFA's SQUFOF is quite competitive compared
      to other similar implementations, even if in practice, SQUFOF is rapidly outperformed by TIFA's QS. Our implementations of QS and SIQS have been substancially revamped in late 2007/early 2008.
      While still slightly slower then the best available implementations, the performance gap has been dramatically narrowe. An implementation of ECM has been added to TIFA in late 2007. However its
      performance is far from being on par with the competition. We hope to address these shortcomings – if time permits – in the near future.</p>
      <p>While still kept internal to the TANC team and CADO project, TIFA will eventually be made public under an open source license, most probably the Lesser General Public License version 2.1 or
      higher.</p>
    </subsection>
  </logiciels>
  <resultats id="uid25">
    <bodyTitle>New Results</bodyTitle>
    <subsection level="1" id="uid26">
      <bodyTitle>Algebraic curves over finite fields</bodyTitle>
      <subsection level="2" id="id63621">
        <bodyTitle>Cardinality</bodyTitle>
        <participants>
          <person key="tanc-2006-idm182960489552">
            <firstname>Andreas</firstname>
            <lastname>Enge</lastname>
          </person>
          <person key="tanc-2006-idm182960493376">
            <firstname>François</firstname>
            <lastname>Morain</lastname>
          </person>
        </participants>
        <p>A crucial ingredient for these records was A. Enge's new algorithm 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid45" location="biblio" xyref="1773043069021"/>for computing modular equations of index greater than 2000. The algorithm computes bivariate modular polynomials
        by an evaluation and interpolation approach and relies on the ability to rapidly evaluate modular functions in complex floating point arguments. It has a quasi-linear complexity with respect
        to its output size, so that the performance of the algorithm is limited only by the size of the result: we have in fact been able to compute modular polynomials of degree larger than 10000
        and of size 16 GB by a parallelised implementation of the algorithm, that uses 
        <tt>mpc</tt>and 
        <tt>mpfrcx</tt>for the arithmetic of complex numbers and of polynomials with floating point coefficients, see Sections  
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#uid20" location="intern" xyref="1773043069021"/>and 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#uid21" location="intern" xyref="1773043069021"/>. For the point counting algorithm, the polynomials of prime level up to 6000 have been used. They occupy a disk space of
        close to 1 TB. Despite this progress, computing modular polynomials remains the stumbling block for new point counting records. Clearly, to circumvent the memory problems, one would need
        an algorithm that directly obtains the polynomial specialised in one variable.</p>
        <p>We plan to make our new implementation available as an extension to the NTL library.</p>
      </subsection>
      <subsection level="2" id="id63708">
        <bodyTitle>Isogenies</bodyTitle>
        <participants>
          <person key="tanc-2006-idm182960493376">
            <firstname>François</firstname>
            <lastname>Morain</lastname>
          </person>
          <person key="tanc-2007-idm335718057152">
            <firstname>Luca</firstname>
            <lastname>De Feo</lastname>
          </person>
        </participants>
        <p>Together with A. Bostan, B. Salvy (from projet 
        <span class="smallcap" align="left">ALGO</span>), and É. Schost, F. Morain gave quasi-linear algorithms for computing the explicit form of a strict isogeny between two elliptic
        curves, another important block in the SEA algorithm 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid4" location="biblio" xyref="1773043069021"/>. This article contains a survey of previous methods, all applicable in the large characteristic case. Joux and
        Lercier have recently announced a 
        <span class="math" align="left"><hi rend="it">p</hi></span>-adic approach for computing isogenies in all characteristic with the same complexity and based on our work.</p>
        <p>For the small case, the old algorithms of Couveignes and Lercier were studied from scratch, and Lercier's algorithm reimplemented in NTL by F. Morain, as a benchmark for other methods
        still being developped. In his master internship, L. De Feo, started cleaning the most recent of them, known as CouveignesII. This algorithm involves building the explicit 
        <span class="math" align="left"><hi rend="it">p</hi><sup><hi rend="it">k</hi></sup></span>torsion of the curve and finding isomorphisms between Artin-Schreier towers. This work already led to the clarification of the complexities involved in several parts. Ongoing work with
        É. Schost already led to improved theoretical constructions and faster algorithms. Several articles are in preparation as a result of a long term visit of De Feo in London (Ontario). A
        fresh implementation in NTL will follow.</p>
      </subsection>
      <subsection level="2" id="id63806">
        <bodyTitle>Discrete logarithms on curves</bodyTitle>
        <participants>
          <person key="tanc-2006-idm182960489552">
            <firstname>Andreas</firstname>
            <lastname>Enge</lastname>
          </person>
          <person key="tanc-2007-idm335718054096">
            <firstname>Jean-François</firstname>
            <lastname>Biasse</lastname>
          </person>
          <person key="tanc-2007-idm335718029328">
            <firstname>Benjamin</firstname>
            <lastname>Smith</lastname>
          </person>
        </participants>
        <p>In 2007 for the very first time in algebraic curve cryptography, A. Enge and P. Gaudry have exhibited a class of curves in which the discrete logarithm problem is attacked by a
        subexponential algorithm of complexity less than 
        <span class="math" align="left"><hi rend="it">L</hi>(1/2)</span>
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid46" location="biblio" xyref="1773043069021"/>. Precisely, the complexity is in 
        <span class="math" align="left"><hi rend="it">L</hi>(1/3)</span>for the preliminary phase of computing the group structure and 
        <span class="math" align="left"><hi rend="it">L</hi>(1/3 + 
        <img width="10" height="12" align="bottom" border="0" src="../../images/img_varepsilon.png" alt="$ \varepsilon$"/>)</span>for any 
        <span class="math" align="left"><img width="10" height="12" align="bottom" border="0" src="../../images/img_varepsilon.png" alt="$ \varepsilon$"/>&gt;0</span>for the discrete logarithms themselves. This shows that the
        corresponding algebraic curve cryptosystems, essentially based on 
        <span class="math" align="left"><hi rend="it">C</hi><sub><hi rend="it">a</hi>, 
          <hi rend="it">b</hi></sub></span>curves with the degrees in 
        <span class="math" align="left"><hi rend="it">X</hi></span>and 
        <span class="math" align="left"><hi rend="it">Y</hi></span>growing in a special way with the genus, are no more secure than RSA and thus of no cryptographic interest.</p>
        <p>This year, we have been able to extend the attack to a much larger class of curves, not necessarily of 
        <span class="math" align="left"><hi rend="it">C</hi><sub><hi rend="it">a</hi>, 
          <hi rend="it">b</hi></sub></span>type, for which the degrees in 
        <span class="math" align="left"><hi rend="it">X</hi></span>and 
        <span class="math" align="left"><hi rend="it">Y</hi></span>grow in a controlled way. We have removed the 
        <span class="math" align="left"><img width="10" height="12" align="bottom" border="0" src="../../images/img_varepsilon.png" alt="$ \varepsilon$"/></span>for the discrete logarithm phase, and have come up with a tight complexity analysis that explains the phase change between the 
        <span class="math" align="left"><hi rend="it">L</hi>(1/3)</span>and the 
        <span class="math" align="left"><hi rend="it">L</hi>(1/2)</span>zone. A publication is in preparation.</p>
        <p>Jean-François Biasse has worked on an implementation of a subexponential algorithm which solves the discrete logarithm problem on hyperelliptic curves of genus 8 in order to study the
        efficiency of a cryptosystem that Edlyn Teske has presented. This cryptosystem relies on the facility of solving this problem, as well as the difficulty of solving the discrete logarithm
        problem on an elliptic curve. This work was presented in October 2008 at the "Journée Nationales du Calcul Formel" in Luminy.</p>
        <p>In another direction, B. Smith has given a polynomial-time reduction of discrete logarithm problem instances from a large class of hyperelliptic curves of genus 3 to non-hyperelliptic
        curves of genus 3, where Diem's algorithm 
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid26" location="biblio" xyref="1773043069021"/>can solve the discrete logarithm problem in time 
        <span class="math" align="left"><hi rend="it">O</hi>( 
        <hi rend="it">q</hi>)</span>. This is a significant improvement over the previous best known algorithm for solving hyperelliptic genus 3 discrete logarithms, due to P. Gaudry,
        E. Thomé, N. Thériault, and C. Diem  
        <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid25" location="biblio" xyref="1773043069021"/>, which runs in time 
        <span class="math" align="left"><hi rend="it">O</hi>( 
        <hi rend="it">q</hi><sup>4/3</sup>)</span>.</p>
      </subsection>
    </subsection>
    <subsection level="1" id="uid27">
      <bodyTitle>Complex multiplication</bodyTitle>
      <participants>
        <person key="tanc-2006-idm182960489552">
          <firstname>Andreas</firstname>
          <lastname>Enge</lastname>
        </person>
        <person key="tanc-2006-idm182960493376">
          <firstname>François</firstname>
          <lastname>Morain</lastname>
        </person>
      </participants>
      <p>A. Enge has been able to analyse precisely the complexity of class polynomial computations via complex floating point approximations 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid47" location="biblio" xyref="1773043069021"/>. Using techniques from fast symbolic computation, namely multievaluation of polynomials, and results from
      R. Dupont's PhD thesis 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid48" location="biblio" xyref="1773043069021"/>, he has obtained two algorithms which are quasi-linear (up to logarithmic factors) in the output size. The second
      algorithm has been used for a record computation of a class polynomial of degree 100,000, the largest coefficient of which has almost 250,000 bits. The implementation is based on 
      <span class="smallcap" align="left">GMP</span>, mpfr, mpc and mpfrcx (see Section 5); the only limiting factor for going further has become the memory requirements of the final result.</p>
      <p>Alternative algorithms use 
      <span class="math" align="left"><hi rend="it">p</hi></span>-adic approximations or the Chinese remainder theorem to compute class polynomials over the integers. A. Enge and his coauthors have presented an optimised algorithm based on
      Chinese remaindering in 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid1" location="biblio" xyref="1773043069021"/>and improved the number theoretic bounds underlying the complexity analysis. They have shown that all three different
      approaches have a quasi-linear complexity, while the the floating point algorithm appeared to be the fastest one in practice.</p>
      <p>Inspired by 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid1" location="biblio" xyref="1773043069021"/>, A. Sutherland has come up with a new implementation of the Chinese remainder based algorithm that has led to
      new record computations 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid49" location="biblio" xyref="1773043069021"/>. Unlike the other algorithms, this approach does not need to hold the complete polynomial in main memory, but
      essentially only one coefficient at a time, which enables it to go much further. The main bottleneck is currently an extension of the algorithm to class invariants, which is work in progress by
      A. Enge.</p>
    </subsection>
    <subsection level="1" id="uid28">
      <bodyTitle>Decoding algebraic codes</bodyTitle>
      <participants>
        <person key="codes-2006-idm111968686864">
          <firstname>Daniel</firstname>
          <lastname>Augot</lastname>
        </person>
        <person key="tanc-2008-idm235749978160">
          <firstname>Morgan</firstname>
          <lastname>Barbier</lastname>
        </person>
      </participants>
      <p>This is a new activity of the TANC project-team, whose aim is to accelerate decoding algorithms of Reed-Solomon codes (with the Guruswami-Sudan algorithm), and of Algebraic Geometric codes.
      With Alexander Zeh, Daniel has found a relation between so-called key equations, which are the standard tool for decoding algebraic codes, and the new interpolation based algorithms  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid50" location="biblio" xyref="1773043069021"/>. The connection is established, and the next step is to use efficient algorithms, that are used for key equations,
      in the context of the Guruswami-Sudan algorithm.</p>
      <p>Another new topic that begins with the arrival of Morgan Barbier is to study list decoding algorithms for codes defined over small alphabets. It was a challenging open problem until the
      publication of Wu  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid51" location="biblio" xyref="1773043069021"/>, which achieves a high decoding radius for BCH codes, which are subfield subcodes of Reed-Solomon codes. This opens
      a new field of applications of these algorithms, and we have in mind to apply Wu's algorithm for steganography, using the ideas of Fontaine and Galand 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid52" location="biblio" xyref="1773043069021"/>. They used Reed-Solomon codes, it seems very natural to use the same ideas with BCH codes. Providing an
      implementation of Wu's algorithm and apply it to steganography is the plan of Barbier's thesis.</p>
    </subsection>
    <subsection level="1" id="uid29">
      <bodyTitle>Security in 
      <i>ad hoc</i>networks</bodyTitle>
      <participants>
        <person key="tanc-2006-idm182960493376">
          <firstname>François</firstname>
          <lastname>Morain</lastname>
        </person>
        <person key="codes-2006-idm111968686864">
          <firstname>Daniel</firstname>
          <lastname>Augot</lastname>
        </person>
        <person key="tanc-2006-idm182960467600">
          <firstname>Jérôme</firstname>
          <lastname>Milan</lastname>
        </person>
      </participants>
      <p>As we mentioned in our previous activity reports, we saw the recent arrival of 
      <span class="smallcap" align="left">Hipercom</span>at École polytechnique as an opportunity to trigger inter-project collaborations in the field of security and cryptographic applications in
      the context of ad hoc networks.</p>
      <p>Following upon our involvement in the ACI SERAC (SEcuRity models and protocols for Ad-hoC Networks) a short one-year teamwork between 
      <span class="smallcap" align="left">TANC</span>and 
      <span class="smallcap" align="left">Hipercom@LIX</span>was initiated in January 2008 as part of the so-called Cryptonet OMT (Opération de Maturation Technologique). This joint effort is mainly
      financed by the Digiteo foundation who hired J. Milan to work as a software programmer and provides marketing and intellectual property legal assistance.</p>
      <p>The main goal of Cryptonet is to present a proof-of-concept of an hardened, more robust OLSRv2  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid53" location="biblio" xyref="1773043069021"/>ad hoc network protocol. For this, we are working with Thomas Clausen and Ulrich Herberg from the 
      <span class="smallcap" align="left">Hipercom@LIX</span>team to bring some basic authentification mechanism in OLSRv2 using digital signature based on elliptic curves (ECDSA  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid54" location="biblio" xyref="1773043069021"/>and pairings on such curves (BSL-like signature  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid55" location="biblio" xyref="1773043069021"/>).</p>
      <p>Such a mechanism has been developped and integrated within 
      <span class="smallcap" align="left">Hipercom@LIX</span>'s jOlsrv2  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid56" location="biblio" xyref="1773043069021"/>framework which provides a Java-based implementation of the OLSRv2 protocol and interfaces with the NS2 network
      simulator.</p>
      <p>Of course achieving ad hoc network security requires far more than mere application of cryptographic primitives. However, by presenting a first milestone, our goal is to spread awareness on
      major security issues arising in the mobile ad hoc network context. We hope to attract industrial partners with a practical stance on security and ultimately foster new academic-industrial
      partnerships.</p>
      <p>Daniel Augot, in cooperation with Hipercom, has worked on Group Key Agreement Protocols, generalizing the Diffie-Hellman protocol. ALthought the theoretical part has been published, a new
      paper with simulation results is in preparation.</p>
    </subsection>
  </resultats>
  <contrats id="uid30">
    <bodyTitle>Contracts and Grants with Industry</bodyTitle>
    <subsection level="1" id="uid31">
      <bodyTitle>Gemplus</bodyTitle>
      <p>This corresponds to É. Brier's thesis on the use of (hyper-)elliptic curves in cryptology.</p>
    </subsection>
    <subsection level="1" id="uid32">
      <bodyTitle>Industrial ANR</bodyTitle>
      <p><span class="smallcap" align="left">Pace</span>: Pairings and advances in cryptology for e-cash, since 2007; with France Télécom R&amp;D, Gemalto, NXP Semiconductors, Cryptolog International,
      École normale supérieure Paris and Université Caen</p>
    </subsection>
  </contrats>
  <international id="uid33">
    <bodyTitle>Other Grants and Activities</bodyTitle>
    <subsection level="1" id="uid34">
      <bodyTitle>Network of excellence</bodyTitle>
      <p>Together with the 
      <span class="smallcap" align="left">SECRET</span>project at INRIA Rocquencourt, the project 
      <span class="smallcap" align="left">TANC</span>has taken part in 
      <span class="smallcap" align="left">Ecrypt</span>, a NoE in the Information Society Technologies theme of the 6th European Framework Programme (FP6).</p>
    </subsection>
    <subsection level="1" id="uid35">
      <bodyTitle>ANR</bodyTitle>
      <p><span class="smallcap" align="left">Cado</span>(since 2006-09-01): two meetings (18-19/01/07 in Nancy for the kickoff and 21-21/06/07 in Paris).</p>
    </subsection>
    <subsection level="1" id="uid36">
      <bodyTitle>Associated team</bodyTitle>
      <p>The TANC project is involved in the associated team ECHECS (“Extreme Computing for (Hyper-)Elliptic Cryptographic Systems”) with É. Schost of University of Western Ontario, London,
      continuing a long-standing collaboration. Our joint work is concerned with using advanced algorithms of symbolic computation (speciality of the Canadian team) in the context of elliptic and
      hyperelliptic curve cryptography (speciality of TANC), in particular for the instantiation of secure cryptosystems.</p>
      <p>As part of this collaboration, L. De Feo visited twice University of Western Ontario (march 2008, november-december 2008) to work with E. Schost on fast symbolic algorithms
      for isogeny computation.</p>
    </subsection>
    <subsection level="1" id="uid37">
      <bodyTitle>OMT</bodyTitle>
      <p>TANC, together with the Hipercom EPI, has started an OMT (offre de maturation technologique) financed by Digiteo. The aim of the Cryptonet OMT is to realize a proof of concept of the use of
      elliptic curves over finite fields in providing security on ad hoc networks. The main interest of elliptic curves in that setting is the low cost and (a priori) low bandwith required for a
      given level of security, as compared to traditional finite field based systems. The engineer attached to this project will inject our knowledge into a standard network simulator. Scientific
      details are provided in Section  
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#uid29" location="intern" xyref="1773043069021"/>.</p>
      <p>The project brings very short signature to OLSR, and such a small size may have non negative impact on the network performance. Testing of such small signatures is in progress.</p>
      <p>The code is in java and is integrated in the Java OLSRv2 implementation of Hipercom. We use the java framework for cryptography, which enables us to use any signature algorithm, not
      necessarly ours.</p>
    </subsection>
  </international>
  <diffusion id="uid38">
    <bodyTitle>Dissemination</bodyTitle>
    <subsection level="1" id="uid39">
      <bodyTitle>Programme committees</bodyTitle>
      <p>A. Enge took part in the programme committee of Pairing 2008 – International Conference on Pairing-Based Cryptography at Royal Holloway University of London. He acted on the scientific
      advisary board of the Journées Nationales de Calcul Formel 2008 at Luminy.</p>
    </subsection>
    <subsection level="1" id="uid40">
      <bodyTitle>Teaching</bodyTitle>
      <p>François Morain was in charge of half of the 2nd year course “Algorithmes et Programmation: du séquentiel au distribué”, together with J.-M. Steyaert. He gives a cryptology course in
      Majeure 2. He is vice-head of the Département d'Informatique. He has been representing École polytechnique in the Commission des Études du Master MPRI, since its creation in 2004.</p>
      <p>At École polytechnique, A. Enge has proposed computer science labs for the second year course “Algorithmes et Programmation: du séquentiel au distribué”. He has developed the practical
      module for the master level cryptology course, centred around securing a network application in the Java cryptography framework JCE.</p>
      <p>B. Smith taught the module on elliptic curve cryptography and pairings in the MPRI course on Cryptologie.</p>
      <p>Daniel Augot taught an introductory course of cryptography (Master 2) at Université de Marne la vallée. He also gave some lectures on algebraic coding theory in the MPRI Master 2. He also
      gave a lecture in the context of a cycles of lectures on cryptology for tunisian officers, organized by Thales.</p>
    </subsection>
    <subsection level="1" id="uid41">
      <bodyTitle>Seminars and talks</bodyTitle>
      <p>Daniel Augot gave a talk “Algorithme de Guruswami-Sudan et généralisations multivariées” au séminaire de de l'IRMAR (Université de Rennes). He was invited at the University of Zürich
      (Joachim Rosenthal), and gave a talk on key equations for the Guruswami-Sudan list decoding algorithm.</p>
      <p><ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid1" location="biblio" xyref="1773043069021"/>has been presented at ANTS-VIII in Banff by A. Enge; it has been rewarded by the Selfridge Prize of the Number
      Theory Foundation for the best paper.</p>
      <p>A. Enge has given an invited lecture on “Discrete logarithms in curves: from 
      <span class="math" align="left"><hi rend="it">L</hi>(1/2)</span>to 
      <span class="math" align="left"><hi rend="it">L</hi>(1/3)</span>” at the Third Franco-Japanese Computer Security Workshop at Nancy.</p>
      <p>He has given three lectures entitled “Un algorithme en 
      <span class="math" align="left"><hi rend="it">L</hi>(1/3 + 
      <img width="10" height="12" align="bottom" border="0" src="../../images/img_varepsilon.png" alt="$ \varepsilon$"/>)</span>pour le problème du logarithme discret dans certaines courbes” at the
      seminar Arithmétique et théorie de l'information at Luminy, the cryptography seminar at Rennes and the seminar Arith at Montpellier.</p>
      <p>A. Enge has spoken on “Constructions de courbes algébriques pour la cryptographie” at the number theory seminar of Marrakech.</p>
      <p>F. Morain spent a week in Tokyo (Chuo University) and gave a talk on 
      <i>Recent improvements to the SEA algorithm in genus 1</i>. F. Morain was invited speaker for ANTS8 in Banff (May 2008); his talk was 
      <i>survey on algorithms for computing isogenies on low genus curves</i>.</p>
    </subsection>
    <p>L. De Feo gave a lecture on “Fast arithmetics in Artin-Schreier towers over finite fields” at C4 in École Polytechnique. He gave a lecture on “Transposition principle” at Journées
    nationales de calcul formel 2008 held in Luminy.</p>
    <p>J.F. Biasse also gave a lecture on “Logarithme discret dans les courbes hyperelliptiques” at Journées nationales de calcul formel 2008 held in Luminy.</p>
    <p>B. Smith presented the research in  
    <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid0" location="biblio" xyref="1773043069021"/>at EUROCRYPT 2008 in Istanbul, where it won the best paper award. He gave an invited talk on discrete logarithms on
    genus 3 curves in the special session on low-genus curves and applications of the 2008 Joint Meetings of the American Mathematical Society and the Mathematical Association of America in San
    Diego, and also gave a talk on the same subject in the Séminaire de Cryptologie at the Université de Caen.</p>
    <subsection level="1" id="uid42">
      <bodyTitle>Vulgarisation and Summer schools</bodyTitle>
      <p>B. Smith gave two lectures on advanced topics in elliptic curves at the DIAMANT Summer School on Elliptic and Hyperelliptic Curve Cryptography in September 2008 in Eindhoven.</p>
      <p>B. Smith has given a lecture on pairings on elliptic curves at the 3rd 
      <span class="smallcap" align="left">Ecrypt</span>PhD Summer School on Advanced Topics in Cryptography in May 2008 on Crete.</p>
      <p>A. Enge has taken part in the school “Référentiels de la cryptographie moderne” organised from October 28 to 31 in Rabat by the Association Marocaine de Cryptographie with a lecture
      series on pairings entitled “Couplages sur les courbes elliptiques — Fondements mathématiques et calcul”.</p>
    </subsection>
    <subsection level="1" id="uid43">
      <bodyTitle>Editorship</bodyTitle>
      <p>A. Enge is editor of “Designs, Codes and Cryptography” since 2004.</p>
      <p>Daniel Augot is guest editor, with Jean-Charles Faugère and Ludovic Perret of a special issue of the Journal of Symbolic Computation, on Gröbner Bases Techniques in Cryptography and Coding
      Theory.</p>
    </subsection>
    <subsection level="1" id="uid44">
      <bodyTitle>Awards</bodyTitle>
      <p>B. Smith has received the best paper award for 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid0" location="biblio" xyref="1773043069021"/>at Eurocrypt 2008 in Istanbul. He has been invited to submit an extended version 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid57" location="biblio" xyref="1773043069021"/>to the Journal of Cryptology.</p>
      <p>A. Enge has received the Selfridge Prize of the Number Theory Foundation for the best paper 
      <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="#tanc-2008-bid1" location="biblio" xyref="1773043069021"/>presented at Algorithmic Number Theory Symposium — ANTS-VIII in Banff.</p>
    </subsection>
    <subsection level="1" id="uid45">
      <bodyTitle>Thesis committees</bodyTitle>
      <p>F. Morain was the president of the defense committee for F. Didier (19/12/2007).</p>
    </subsection>
    <subsection level="1" id="uid46">
      <bodyTitle>Research administration</bodyTitle>
      <p>A. Enge is correspondent for European affairs of INRIA Saclay–Île-de-France (formerly INRIA Futurs) since 2006 and correspondent for international affairs since 2007.</p>
      <p>F. Morain represents INRIA in the “Conseil d'UFR 929 Maths Université Paris 6” since September 2005.</p>
    </subsection>
  </diffusion>
  <biblio id="bibliography" html="bibliography" numero="10" titre="Bibliography">
    <biblStruct id="tanc-2008-bid0" type="inproceedings" rend="year" n="cite:Smith08" default="NO">
      <analytic>
        <title level="a">Isogenies and the Discrete Logarithm Problem in Jacobians of Genus 3 Hyperelliptic Curves</title>
        <author>
          <persName key="tanc-2007-idm335718029328">
            <foreName>B.</foreName>
            <surname>Smith</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>N.</foreName>
            <surname>Smart</surname>
            <initial>N.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology - EUROCRYPT 2008</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">4965</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">163-180</biblScope>
        </imprint>
        <meeting id="cid32774">
          <title>Annual International Conference on the Theory and Applications of Cryptographic Techniques</title>
          <num>27</num>
          <abbr type="sigle">EUROCRYPT</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid1" type="inproceedings" rend="year" n="cite:BeBrEnLa08" default="NO">
      <analytic>
        <title level="a">Computing Hilbert class polynomials</title>
        <author>
          <persName>
            <foreName>Juliana</foreName>
            <surname>Belding</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Reinier</foreName>
            <surname>Bröker</surname>
            <initial>R.</initial>
          </persName>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Kristin</foreName>
            <surname>Lauter</surname>
            <initial>K.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Alf</foreName>
            <surname>van der Poorten</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>Andreas</foreName>
            <surname>Stein</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory - ANTS-VIII, Berlin</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">5011</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">282–295</biblScope>
        </imprint>
        <meeting id="cid27943">
          <title>Algorithmic Number Theory Symposium</title>
          <num>8</num>
          <abbr type="sigle">ANTS</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid10" type="inproceedings" rend="foot" n="footcite:BoGaSc04" default="NO">
      <analytic>
        <title level="a">Linear recurrences with polynomial coefficients and computation of the Cartier-Manin operator on hyperelliptic curves</title>
        <author>
          <persName key="algo-2006-idm131447027744">
            <foreName>A.</foreName>
            <surname>Bostan</surname>
            <initial>A.</initial>
          </persName>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>É.</foreName>
            <surname>Schost</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>G.</foreName>
            <surname>Mullen</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>A.</foreName>
            <surname>Poli</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>H.</foreName>
            <surname>Stichtenoth</surname>
            <initial>H.</initial>
          </persName>
        </editor>
        <title level="m">Finite Fields and Applications, 7th International Conference, Fq7</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">2948</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <biblScope type="pages">40–58</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Pierrick.Gaudry/publis/cartierFq7.ps.gz" location="extern" xyref="1881009603021">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Pierrick. 
          <allowbreak/>Gaudry/ 
          <allowbreak/>publis/ 
          <allowbreak/>cartierFq7. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid11" type="inproceedings" rend="foot" n="footcite:JaMiVe05" default="NO">
      <analytic>
        <title level="a">Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?</title>
        <author>
          <persName>
            <foreName>D.</foreName>
            <surname>Jao</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>S. D.</foreName>
            <surname>Miller</surname>
            <initial>S. D.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Venkatesan</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">ASIACRYPT</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
          <biblScope type="pages">21-40</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid12" type="article" rend="foot" n="footcite:Teske06" default="NO">
      <analytic>
        <title level="a">An elliptic trapdoor system</title>
        <author>
          <persName>
            <foreName>E.</foreName>
            <surname>Teske</surname>
            <initial>E.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">J. of Cryptology</title>
        <imprint>
          <biblScope type="volume">19</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
          <biblScope type="pages">115–133</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid13" type="misc" rend="foot" n="footcite:RoSt06" default="NO">
      <monogr>
        <title level="m">Public-key cryptosystem based on isogenies</title>
        <author>
          <persName>
            <foreName>A.</foreName>
            <surname>Rostovtsev</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960452800">
            <foreName>A.</foreName>
            <surname>Stolbunov</surname>
            <initial>A.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://eprint.iacr.org/" location="extern" xyref="1869085762012">http:// 
          <allowbreak/>eprint. 
          <allowbreak/>iacr. 
          <allowbreak/>org/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
      <note type="howpublished" anchored="yes" place="unspecified">Cryptology ePrint Archive, Report 2006/145</note>
    </biblStruct>
    <biblStruct id="tanc-2008-bid14" type="phdthesis" rend="foot" n="footcite:Couveignes94" default="NO">
      <monogr>
        <title level="m">Quelques calculs en théorie des nombres</title>
        <author>
          <persName>
            <foreName>J.-M.</foreName>
            <surname>Couveignes</surname>
            <initial>J.-M.</initial>
          </persName>
        </author>
        <note type="typdoc" anchored="yes" place="unspecified">Thèse</note>
        <imprint>
          <publisher>
            <orgName type="school">Université de Bordeaux I</orgName>
          </publisher>
          <dateStruct>
            <month full="yes">July</month>
            <year full="yes">1994</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid15" type="inproceedings" rend="foot" n="footcite:Couveignes96" default="NO">
      <analytic>
        <title level="a">Computing 
        <span class="math" align="left"><hi rend="it">l</hi></span>-isogenies using the 
        <span class="math" align="left"><hi rend="it">p</hi></span>-torsion</title>
        <author>
          <persName>
            <foreName>J.-M.</foreName>
            <surname>Couveignes</surname>
            <initial>J.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>H.</foreName>
            <surname>Cohen</surname>
            <initial>H.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <note type="bnote" anchored="yes" place="unspecified">Second International Symposium, ANTS-II, Talence, France, May 1996, Proceedings</note>
        <imprint>
          <biblScope type="volume">1122</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">1996</year>
          </dateStruct>
          <biblScope type="pages">59–65</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid16" type="article" rend="foot" n="footcite:LeMo00" default="NO">
      <analytic>
        <title level="a">Computing isogenies between elliptic curves over 
        <span class="math" align="left"><hi rend="it">F</hi><sub><hi rend="it">p</hi><sup><hi rend="it">n</hi></sup></sub></span>using Couveignes's algorithm</title>
        <author>
          <persName>
            <foreName>R.</foreName>
            <surname>Lercier</surname>
            <initial>R.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">69</biblScope>
          <biblScope type="number">229</biblScope>
          <dateStruct>
            <month full="yes">January</month>
            <year full="yes">2000</year>
          </dateStruct>
          <biblScope type="pages">351–370</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid17" type="inproceedings" rend="foot" n="footcite:Lercier96b" default="NO">
      <analytic>
        <title level="a">Computing isogenies in 
        <span class="math" align="left"><hi rend="it">F</hi><sub>2 
          <sup><hi rend="it">n</hi></sup></sub></span></title>
        <author>
          <persName>
            <foreName>R.</foreName>
            <surname>Lercier</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>H.</foreName>
            <surname>Cohen</surname>
            <initial>H.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <note type="bnote" anchored="yes" place="unspecified">Second International Symposium, ANTS-II, Talence, France, May 1996, Proceedings</note>
        <imprint>
          <biblScope type="volume">1122</biblScope>
          <publisher>
            <orgName>Springer Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">1996</year>
          </dateStruct>
          <biblScope type="pages">197–212</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid18" type="inproceedings" rend="foot" n="footcite:AdDeHu94" default="NO">
      <analytic>
        <title level="a">A Subexponential Algorithm for Discrete Logarithms over the Rational Subgroup of the Jacobians of Large Genus Hyperelliptic Curves over Finite Fields</title>
        <author>
          <persName>
            <foreName>Leonard M.</foreName>
            <surname>Adleman</surname>
            <initial>L. M.</initial>
          </persName>
          <persName>
            <foreName>Jonathan</foreName>
            <surname>DeMarrais</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>Ming-Deh</foreName>
            <surname>Huang</surname>
            <initial>M.-D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Leonard M.</foreName>
            <surname>Adleman</surname>
            <initial>L. M.</initial>
          </persName>
          <persName>
            <foreName>Ming-Deh</foreName>
            <surname>Huang</surname>
            <initial>M.-D.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory, Berlin</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">877</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">1994</year>
          </dateStruct>
          <biblScope type="pages">28–40</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid19" type="article" rend="foot" n="footcite:Enge02" default="NO">
      <analytic>
        <title level="a">Computing Discrete Logarithms in High-Genus Hyperelliptic Jacobians in Provably Subexponential Time</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">71</biblScope>
          <biblScope type="number">238</biblScope>
          <dateStruct>
            <year full="yes">2002</year>
          </dateStruct>
          <biblScope type="pages">729–742</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid2" type="misc" rend="year" n="cite:cado" default="NO">
      <monogr>
        <title level="m">CADO — Number field sieve: distribution, optimization</title>
        <author>
          <persName>
            <foreName/>
            <surname>The CADO Team</surname>
            <initial/>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://cado.gforge.inria.fr/" location="extern" xyref="396860109011">http:// 
          <allowbreak/>cado. 
          <allowbreak/>gforge. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/></ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid20" type="article" rend="refer" n="refercite:EnGa02" default="NO">
      <analytic>
        <title level="a">A general framework for subexponential discrete logarithm algorithms</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Acta Arith.</title>
        <imprint>
          <biblScope type="volume">CII</biblScope>
          <biblScope type="number">1</biblScope>
          <dateStruct>
            <year full="yes">2002</year>
          </dateStruct>
          <biblScope type="pages">83–103</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid21" type="inproceedings" rend="foot" n="footcite:Enge01" default="NO">
      <analytic>
        <title level="a">A General Framework for Subexponential Discrete Logarithm Algorithms in Groups of Unknown Order</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>A.</foreName>
            <surname>Blokhuis</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>J. W. P.</foreName>
            <surname>Hirschfeld</surname>
            <initial>J. W. P.</initial>
          </persName>
          <persName>
            <foreName>D.</foreName>
            <surname>Jungnickel</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>J. A.</foreName>
            <surname>Thas</surname>
            <initial>J. A.</initial>
          </persName>
        </editor>
        <title level="m">Finite Geometries, Dordrecht</title>
        <title level="s">Developments in Mathematics</title>
        <imprint>
          <biblScope type="volume">3</biblScope>
          <publisher>
            <orgName>Kluwer Academic Publishers</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
          <biblScope type="pages">133–146</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid22" type="inproceedings" rend="foot" n="footcite:Couveignes01" default="NO">
      <analytic>
        <title level="a">Algebraic Groups and Discrete Logarithm</title>
        <author>
          <persName>
            <foreName>Jean-Marc</foreName>
            <surname>Couveignes</surname>
            <initial>J.-M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>K.</foreName>
            <surname>Alster</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Urbanowicz</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>H. C.</foreName>
            <surname>Williams</surname>
            <initial>H. C.</initial>
          </persName>
        </editor>
        <title level="m">Public-Key Cryptography and Computational Number Theory, Berlin</title>
        <imprint>
          <publisher>
            <orgName>De Gruyter</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
          <biblScope type="pages">17–27</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid23" type="unpublished" rend="foot" n="footcite:Hess04" default="NO">
      <monogr>
        <title level="m">Computing Relations in Divisor Class Groups of Algebraic Curves over Finite Fields</title>
        <author>
          <persName>
            <foreName>Florian</foreName>
            <surname>Hess</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">Draft version</note>
        <imprint>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.math.tu-berlin.de/~hess/personal/dlog.ps.gz" location="extern" xyref="34522183011">http:// 
          <allowbreak/>www. 
          <allowbreak/>math. 
          <allowbreak/>tu-berlin. 
          <allowbreak/>de/ 
          <allowbreak/>~hess/ 
          <allowbreak/>personal/ 
          <allowbreak/>dlog. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid24" type="inproceedings" rend="foot" n="footcite:Gaudry00" default="NO">
      <analytic>
        <title level="a">An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>Pierrick</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Bart</foreName>
            <surname>Preneel</surname>
            <initial>B.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology — EUROCRYPT 2000, Berlin</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">1807</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2000</year>
          </dateStruct>
          <biblScope type="pages">19–34</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid25" type="article" rend="foot" n="footcite:GaThThDi07" default="NO">
      <analytic>
        <title level="a">A double large prime variation for small genus hyperelliptic index calculus</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName key="spaces-2006-idm18803805392">
            <foreName>E.</foreName>
            <surname>Thomé</surname>
            <initial>E.</initial>
          </persName>
          <persName>
            <foreName>N.</foreName>
            <surname>Thériault</surname>
            <initial>N.</initial>
          </persName>
          <persName>
            <foreName>C.</foreName>
            <surname>Diem</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">76</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">475–492</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.loria.fr/~gaudry/publis/dbleLP.ps.gz" location="extern" xyref="387172288015">http:// 
          <allowbreak/>www. 
          <allowbreak/>loria. 
          <allowbreak/>fr/ 
          <allowbreak/>~gaudry/ 
          <allowbreak/>publis/ 
          <allowbreak/>dbleLP. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid26" type="inproceedings" rend="foot" n="footcite:Diem06" default="NO">
      <analytic>
        <title level="a">An Index Calculus Algorithm for Plane Curves of Small Degree</title>
        <author>
          <persName>
            <foreName>Claus</foreName>
            <surname>Diem</surname>
            <initial>C.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Florian</foreName>
            <surname>Hess</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Sebastian</foreName>
            <surname>Pauli</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Michael</foreName>
            <surname>Pohst</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory — ANTS-VII, Berlin</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">4076</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
          <biblScope type="pages">543–557</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid27" type="inproceedings" rend="foot" n="footcite:Joux00" default="NO">
      <analytic>
        <title level="a">A One Round Protocol for Tripartite Diffie–Hellman</title>
        <author>
          <persName>
            <foreName>Antoine</foreName>
            <surname>Joux</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Wieb</foreName>
            <surname>Bosma</surname>
            <initial>W.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory — ANTS-IV, Berlin</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">1838</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2000</year>
          </dateStruct>
          <biblScope type="pages">385–393</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid28" type="misc" rend="foot" n="footcite:SaOhKa00" default="NO">
      <monogr>
        <title level="m">Cryptosystems based on pairing</title>
        <author>
          <persName>
            <foreName>R.</foreName>
            <surname>Sakai</surname>
            <initial>R.</initial>
          </persName>
          <persName>
            <foreName>K.</foreName>
            <surname>Ohgishi</surname>
            <initial>K.</initial>
          </persName>
          <persName>
            <foreName>M.</foreName>
            <surname>Kasahara</surname>
            <initial>M.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">SCIS 2000, The 2000 Symposium on Cryptography and Information Security, Okinawa, Japan, January 26–28</note>
        <imprint>
          <dateStruct>
            <year full="yes">2000</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid29" type="article" rend="foot" n="footcite:DuEnMo05" default="NO">
      <analytic>
        <title level="a">Building curves with arbitrary small MOV degree over finite prime fields</title>
        <author>
          <persName key="odyssee-2006-idm405611862560">
            <foreName>R.</foreName>
            <surname>Dupont</surname>
            <initial>R.</initial>
          </persName>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">J. of Cryptology</title>
        <imprint>
          <biblScope type="volume">18</biblScope>
          <biblScope type="number">2</biblScope>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
          <biblScope type="pages">79–89</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Andreas.Enge/vorabdrucke/mov.ps.gz" location="extern" xyref="689264209005">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Andreas. 
          <allowbreak/>Enge/ 
          <allowbreak/>vorabdrucke/ 
          <allowbreak/>mov. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid3" type="inproceedings" rend="foot" n="footcite:GaMo06" default="NO">
      <analytic>
        <title level="a">Fast algorithms for computing the eigenvalue in the Schoof-Elkies-Atkin algorithm</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">ISSAC '06: Proceedings of the 2006 international symposium on Symbolic and algebraic computation, New York, NY, USA</title>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
          <biblScope type="pages">109–115</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00001009" location="extern" xyref="1689355578030">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00001009</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid30" type="inproceedings" rend="foot" n="footcite:BaLySc03" default="NO">
      <analytic>
        <title level="a">Constructing Elliptic Curves with Prescribed Embedding Degrees</title>
        <author>
          <persName>
            <foreName>Paulo S. L. M.</foreName>
            <surname>Barreto</surname>
            <initial>P. S. L. M.</initial>
          </persName>
          <persName>
            <foreName>Ben</foreName>
            <surname>Lynn</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>Michael</foreName>
            <surname>Scott</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Stelvio</foreName>
            <surname>Cimato</surname>
            <initial>S.</initial>
          </persName>
          <persName>
            <foreName>Clemente</foreName>
            <surname>Galdi</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>Giuseppe</foreName>
            <surname>Persiano</surname>
            <initial>G.</initial>
          </persName>
        </editor>
        <title level="m">Security in Communication Networks — Third International Conference, SCN 2002, Amalfi, Italy, September 2002, Berlin</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">2576</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2003</year>
          </dateStruct>
          <biblScope type="pages">257–267</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid31" type="inproceedings" rend="refer" n="refercite:EnMo02" default="NO">
      <analytic>
        <title level="a">Comparing Invariants for Class Fields of Imaginary Quadratic Fields</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>C.</foreName>
            <surname>Fieker</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>D. R.</foreName>
            <surname>Kohel</surname>
            <initial>D. R.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <note type="bnote" anchored="yes" place="unspecified">5th International Symposium, ANTS-V, Sydney, Australia, July 2002, Proceedings</note>
        <imprint>
          <biblScope type="volume">2369</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2002</year>
          </dateStruct>
          <biblScope type="pages">252–266</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid32" type="inproceedings" rend="foot" n="footcite:EnMo03" default="NO">
      <analytic>
        <title level="a">Fast decomposition of polynomials with known Galois group</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>M.</foreName>
            <surname>Fossorier</surname>
            <initial>M.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Høholdt</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>A.</foreName>
            <surname>Poli</surname>
            <initial>A.</initial>
          </persName>
        </editor>
        <title level="m">Applied Algebra, Algebraic Algorithms and Error-Correcting Codes</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <note type="bnote" anchored="yes" place="unspecified">15th International Symposium, AAECC-15, Toulouse, France, May 2003, Proceedings</note>
        <imprint>
          <biblScope type="volume">2643</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2003</year>
          </dateStruct>
          <biblScope type="pages">254–264</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid33" type="article" rend="refer" n="refercite:Morain07" default="NO">
      <analytic>
        <title level="a">Implementing the asymptotically fast version of the elliptic curve primality proving algorithm</title>
        <author>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-editorial-board="yes" x-international-audience="yes">
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">76</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">493–505</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid34" type="inbook" rend="foot" n="footcite:Morain05b" default="NO">
      <analytic>
        <author>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
        <title level="a">Elliptic curves for primality proving</title>
      </analytic>
      <monogr>
        <title level="m">Encyclopedia of cryptography and security</title>
        <editor role="editor">
          <persName>
            <foreName>H. C. A.</foreName>
            <surname>van Tilborg</surname>
            <initial>H. C. A.</initial>
          </persName>
        </editor>
        <imprint>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid35" type="unpublished" rend="foot" n="footcite:LePo05" default="NO">
      <monogr>
        <title level="m">Primality testing with Gaussian periods</title>
        <author>
          <persName>
            <foreName>H. W. Jr.</foreName>
            <surname>Lenstra</surname>
            <initial>H. W. Jr.</initial>
          </persName>
          <persName>
            <foreName>C.</foreName>
            <surname>Pomerance</surname>
            <initial>C.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">Preliminary version</note>
        <imprint>
          <dateStruct>
            <month full="yes">July</month>
            <year full="yes">2005</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.math.dartmouth.edu/~carlp/PDF/complexity072805.pdf" location="extern" xyref="1488913599011">http:// 
          <allowbreak/>www. 
          <allowbreak/>math. 
          <allowbreak/>dartmouth. 
          <allowbreak/>edu/ 
          <allowbreak/>~carlp/ 
          <allowbreak/>PDF/ 
          <allowbreak/>complexity072805. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid36" type="article" rend="foot" n="footcite:Bernstein07" default="NO">
      <analytic>
        <title level="a">Proving primality in essentially quartic expected time</title>
        <author>
          <persName>
            <foreName>D.</foreName>
            <surname>Bernstein</surname>
            <initial>D.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">76</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">389–403</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid37" type="inproceedings" rend="foot" n="footcite:FrKlMoWi04" default="NO">
      <analytic>
        <title level="a">Proving the primality of very large numbers with fastECPP</title>
        <author>
          <persName key="ecoo-2008-idm7144577216">
            <foreName>J.</foreName>
            <surname>Franke</surname>
            <initial>J.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Kleinjung</surname>
            <initial>T.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>T.</foreName>
            <surname>Wirth</surname>
            <initial>T.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>D.</foreName>
            <surname>Buell</surname>
            <initial>D.</initial>
          </persName>
        </editor>
        <title level="m">Algorithmic Number Theory</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <note type="bnote" anchored="yes" place="unspecified">6th International Symposium, ANTS-VI, Burlington, VT, USA, June 2004, Proceedings</note>
        <imprint>
          <biblScope type="volume">3076</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <biblScope type="pages">194–207</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct subtype="nonparu" id="tanc-2008-bid38" type="article" rend="year" n="cite:Dupont08" default="NO">
      <analytic>
        <title level="a">Fast evaluation of modular functions using Newton iterations and the AGM</title>
        <author>
          <persName key="odyssee-2006-idm405611862560">
            <foreName>R.</foreName>
            <surname>Dupont</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01492" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0025-5718</idno>
        <title level="j">Math. Comp.</title>
        <note type="bnote" anchored="yes" place="unspecified">To appear</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Regis.Dupont/preprints/Dupont_FastEvalMod.ps.gz" location="extern" xyref="3599696026029">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Regis. 
          <allowbreak/>Dupont/ 
          <allowbreak/>preprints/ 
          <allowbreak/>Dupont_FastEvalMod. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid39" type="inbook" rend="foot" n="footcite:HovLiPe98" default="NO">
      <analytic>
        <author>
          <persName>
            <foreName>T.</foreName>
            <surname>Høholdt</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>J. H.</foreName>
            <surname>van Lint</surname>
            <initial>J. H.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Pellikaan</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <title level="a">Algebraic geometry codes</title>
      </analytic>
      <monogr>
        <title level="m">Handbook of Coding Theory</title>
        <imprint>
          <biblScope type="volume">I</biblScope>
          <publisher>
            <orgName>Elsevier</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">1998</year>
          </dateStruct>
          <biblScope type="pages">871–961</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid4" type="article" rend="year" n="cite:BoMoSaSc08" default="NO">
      <analytic>
        <title level="a">Fast algorithms for computing isogenies between elliptic curves</title>
        <author>
          <persName key="algo-2006-idm131447027744">
            <foreName>A.</foreName>
            <surname>Bostan</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
          <persName key="algo-2006-idm131447038064">
            <foreName>B.</foreName>
            <surname>Salvy</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>É.</foreName>
            <surname>Schost</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01492" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0025-5718</idno>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">77</biblScope>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">1755–1778</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid40" type="article" rend="foot" n="footcite:GuSu99" default="NO">
      <analytic>
        <title level="a">Improved decoding of Reed-Solomon and algebraic-geometry codes</title>
        <author>
          <persName>
            <foreName>Venkatesan</foreName>
            <surname>Guruswami</surname>
            <initial>V.</initial>
          </persName>
          <persName>
            <foreName>Madhu</foreName>
            <surname>Sudan</surname>
            <initial>M.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">IEEE Transactions on Information Theory</title>
        <imprint>
          <biblScope type="volume">45</biblScope>
          <biblScope type="number">6</biblScope>
          <dateStruct>
            <year full="yes">1999</year>
          </dateStruct>
          <biblScope type="pages">1757–1767</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid41" type="article" rend="foot" n="footcite:MoBr75" default="NO">
      <analytic>
        <title level="a">A method of factoring and the factorization of 
        <span class="math" align="left"><hi rend="it">F</hi><sub>7</sub></span></title>
        <author>
          <persName>
            <foreName>M. A.</foreName>
            <surname>Morrison</surname>
            <initial>M. A.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Brillhart</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">29</biblScope>
          <biblScope type="number">129</biblScope>
          <dateStruct>
            <month full="yes">January</month>
            <year full="yes">1975</year>
          </dateStruct>
          <biblScope type="pages">183-205</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid42" type="article" rend="foot" n="footcite:Mckee99" default="NO">
      <analytic>
        <title level="a">Speeding Fermat's Factoring Method</title>
        <author>
          <persName>
            <foreName>J.</foreName>
            <surname>McKee</surname>
            <initial>J.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">68</biblScope>
          <biblScope type="number">228</biblScope>
          <dateStruct>
            <month full="yes">October</month>
            <year full="yes">1999</year>
          </dateStruct>
          <biblScope type="pages">1729-1737</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid43" type="misc" rend="foot" n="footcite:Contini97" default="NO">
      <monogr>
        <title level="m">Factoring integers with the self-initializing quadratic sieve</title>
        <author>
          <persName>
            <foreName>S.</foreName>
            <surname>Contini</surname>
            <initial>S.</initial>
          </persName>
        </author>
        <imprint>
          <dateStruct>
            <year full="yes">1997</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://citeseer.ist.psu.edu/contini97factoring.html" location="extern" xyref="2954370824021">http:// 
          <allowbreak/>citeseer. 
          <allowbreak/>ist. 
          <allowbreak/>psu. 
          <allowbreak/>edu/ 
          <allowbreak/>contini97factoring. 
          <allowbreak/>html</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid44" type="article" rend="foot" n="footcite:GoWa08" default="NO">
      <analytic>
        <title level="a">Square form factorization</title>
        <author>
          <persName>
            <foreName>J. E.</foreName>
            <surname>Gower</surname>
            <initial>J. E.</initial>
          </persName>
          <persName>
            <foreName>S. S.</foreName>
            <surname>Wagstaff, Jr.</surname>
            <initial>S. S.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">77</biblScope>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">551–588</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct subtype="nonparu" id="tanc-2008-bid45" type="article" rend="year" n="cite:Enge08modular" default="NO">
      <analytic>
        <title level="a">Computing modular polynomials in quasi-linear time</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01492" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0025-5718</idno>
        <title level="j">Mathematics of Computation</title>
        <note type="bnote" anchored="yes" place="unspecified">To appear</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid46" type="inproceedings" rend="refer" n="refercite:EnGa07" default="NO">
      <analytic>
        <title level="a">An 
        <span class="math" align="left"><hi rend="it">L</hi>(1/3 + 
        <img width="10" height="12" align="bottom" border="0" src="../../images/img_varepsilon.png" alt="$ \varepsilon$"/></span>) algorithm for the discrete logarithm problem for low degree
        curves</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName key="spaces-2006-idm18803813792">
            <foreName>Pierrick</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <editor role="editor">
          <persName>
            <foreName>Moni</foreName>
            <surname>Naor</surname>
            <initial>M.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology — Eurocrypt 2007, Berlin</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">4515</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">379–393</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00135324" location="extern" xyref="13076691026">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00135324</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct subtype="nonparu" id="tanc-2008-bid47" type="article" rend="year" n="cite:Enge08class" default="NO">
      <analytic>
        <title level="a">The complexity of class polynomial computation via floating point approximations</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01492" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0025-5718</idno>
        <title level="j">Mathematics of Computation</title>
        <note type="bnote" anchored="yes" place="unspecified">To appear</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid48" type="phdthesis" rend="foot" n="footcite:Dupont06" default="NO">
      <monogr>
        <title level="m">Moyenne arithmético-géométrique, suites de Borchardt et applications</title>
        <author>
          <persName key="odyssee-2006-idm405611862560">
            <foreName>R.</foreName>
            <surname>Dupont</surname>
            <initial>R.</initial>
          </persName>
        </author>
        <note type="typdoc" anchored="yes" place="unspecified">Ph. D. Thesis</note>
        <imprint>
          <publisher>
            <orgName type="school">École polytechnique</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid49" type="misc" rend="foot" n="footcite:Sutherland08" default="NO">
      <monogr>
        <title level="m">Computing Hilbert class polynomials with the CRT method</title>
        <author>
          <persName>
            <foreName>Andrew</foreName>
            <surname>Sutherland</surname>
            <initial>A.</initial>
          </persName>
        </author>
        <note type="bnote" anchored="yes" place="unspecified">Talk at the 12th Workshop on Elliptic Curve Cryptography (ECC)</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.hyperelliptic.org/tanja/conf/ECC08/slides/Andrew-V-Sutherland.pdf" location="extern" xyref="2117107775022">http:// 
          <allowbreak/>www. 
          <allowbreak/>hyperelliptic. 
          <allowbreak/>org/ 
          <allowbreak/>tanja/ 
          <allowbreak/>conf/ 
          <allowbreak/>ECC08/ 
          <allowbreak/>slides/ 
          <allowbreak/>Andrew-V-Sutherland. 
          <allowbreak/>pdf</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid5" type="inproceedings" rend="refer" n="refercite:MiMoSc07" default="NO">
      <analytic>
        <title level="a">Computing the eigenvalue in the Schoof-Elkies-Atkin algorithm using Abelian lifts</title>
        <author>
          <persName>
            <foreName>P.</foreName>
            <surname>Mihăilescu</surname>
            <initial>P.</initial>
          </persName>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>É.</foreName>
            <surname>Schost</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">ISSAC '07: Proceedings of the 2007 international symposium on Symbolic and algebraic computation, New York, NY, USA</title>
        <imprint>
          <publisher>
            <orgName>ACM Press</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">285–292</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://hal.inria.fr/inria-00130142" location="extern" xyref="1153395848021">http:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00130142</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid50" type="inproceedings" rend="year" n="cite:AuZe:ISIT2008" default="NO">
      <analytic>
        <title level="a">On the Roth and Ruckenstein equations for the Guruswami-Sudan algorithm</title>
        <author>
          <persName key="codes-2006-idm111968686864">
            <foreName>Daniel</foreName>
            <surname>Augot</surname>
            <initial>D.</initial>
          </persName>
          <persName key="codes-2007-idm287793822880">
            <foreName>Alexander</foreName>
            <surname>Zeh</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes">
        <title level="m">Information Theory, 2008. ISIT 2008. IEEE International Symposium on</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">2620–2624</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://dx.doi.org/10.1109/ISIT.2008.4595466" location="extern" xyref="3301633465014">http:// 
          <allowbreak/>dx. 
          <allowbreak/>doi. 
          <allowbreak/>org/ 
          <allowbreak/>10. 
          <allowbreak/>1109/ 
          <allowbreak/>ISIT. 
          <allowbreak/>2008. 
          <allowbreak/>4595466</ref>
        </imprint>
        <meeting id="cid89373">
          <title>IEEE International Symposium on Information Theory</title>
          <num>2008</num>
          <abbr type="sigle">ISIT</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid51" type="article" rend="foot" n="footcite:Wu08" default="NO">
      <analytic>
        <title level="a">New List Decoding Algorithms for Reed-Solomon and BCH Codes</title>
        <author>
          <persName>
            <foreName>Y.</foreName>
            <surname>Wu</surname>
            <initial>Y.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Information Theory, IEEE Transactions on</title>
        <imprint>
          <biblScope type="volume">54</biblScope>
          <biblScope type="number">8</biblScope>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">3611–3630</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://dx.doi.org/10.1109/TIT.2008.926355" location="extern" xyref="1374469756003">http:// 
          <allowbreak/>dx. 
          <allowbreak/>doi. 
          <allowbreak/>org/ 
          <allowbreak/>10. 
          <allowbreak/>1109/ 
          <allowbreak/>TIT. 
          <allowbreak/>2008. 
          <allowbreak/>926355</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid52" type="inproceedings" rend="foot" n="footcite:FoGa07" default="NO">
      <analytic>
        <title level="a">How Can Reed-Solomon Codes Improve Steganographic Schemes?</title>
        <author>
          <persName key="temics-2006-idm45153407760">
            <foreName>Caroline</foreName>
            <surname>Fontaine</surname>
            <initial>C.</initial>
          </persName>
          <persName key="codes-2006-idm111968645392">
            <foreName>Fabien</foreName>
            <surname>Galand</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName key="temics-2006-idm45153418896">
            <foreName>Teddy</foreName>
            <surname>Furon</surname>
            <initial>T.</initial>
          </persName>
          <persName>
            <foreName>François</foreName>
            <surname>Cayre</surname>
            <initial>F.</initial>
          </persName>
          <persName>
            <foreName>Gwenaël</foreName>
            <surname>Doërr</surname>
            <initial>G.</initial>
          </persName>
          <persName>
            <foreName>Patrick</foreName>
            <surname>Bas</surname>
            <initial>P.</initial>
          </persName>
        </editor>
        <title level="m">Information Hiding</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="number">4567</biblScope>
          <publisher>
            <orgName>Springer Berlin / Heidelberg</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">130–144</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www-rocq.inria.fr/secret/Frederic.Didier/machines.php" location="extern" xyref="785360846001">http:// 
          <allowbreak/>www-rocq. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>secret/ 
          <allowbreak/>Frederic. 
          <allowbreak/>Didier/ 
          <allowbreak/>machines. 
          <allowbreak/>php</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid53" type="techreport" rend="foot" n="footcite:ClDeJa2008" default="NO">
      <monogr>
        <title level="m">The Optimized Link State Routing Protocol version 2</title>
        <author>
          <persName>
            <foreName>C.</foreName>
            <surname>Clausen</surname>
            <initial>C.</initial>
          </persName>
          <persName key="hipercom-2006-idm328444121984">
            <foreName>P.</foreName>
            <surname>Jacquet</surname>
            <initial>P.</initial>
          </persName>
        </author>
        <note type="typdoc" anchored="yes" place="unspecified">Technical report</note>
        <imprint>
          <publisher>
            <orgName type="institution">IETF Draft</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid54" type="techreport" rend="foot" n="footcite:ECDSA" default="NO">
      <monogr>
        <title level="m">Digital Signature Standard (DSS)</title>
        <note type="typdoc" anchored="yes" place="unspecified">Technical report</note>
        <imprint>
          <biblScope type="number">FIPS PUB 186-3</biblScope>
          <publisher>
            <orgName type="institution">National Institute of Standards and Technology</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2006</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid55" type="inproceedings" rend="foot" n="footcite:bls2001" default="NO">
      <analytic>
        <title level="a">Short signatures from the Weil pairing</title>
        <author>
          <persName>
            <foreName>D</foreName>
            <surname>Boneh</surname>
            <initial>D.</initial>
          </persName>
          <persName>
            <foreName>B</foreName>
            <surname>Lynn</surname>
            <initial>B.</initial>
          </persName>
          <persName>
            <foreName>H</foreName>
            <surname>Shacham</surname>
            <initial>H.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Colin</foreName>
            <surname>Boyd</surname>
            <initial>C.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December
        9-13, 2001, Proceedings</title>
        <title level="s">Lecture Notes in Computer Science</title>
        <imprint>
          <biblScope type="volume">2248</biblScope>
          <publisher>
            <orgName>Springer</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2001</year>
          </dateStruct>
          <biblScope type="pages">514-532</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid56" type="inproceedings" rend="foot" n="footcite:Her2008" default="NO">
      <analytic>
        <title level="a">JOLSRv2: An OLSRv2 implementation in Java</title>
        <author>
          <persName>
            <foreName>Urlich</foreName>
            <surname>Herberg</surname>
            <initial>U.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="m">4th OLSR Interop Workshop, Ottawa, Canada</title>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct subtype="nonparu" id="tanc-2008-bid57" type="article" rend="year" n="cite:Smith08JCrypt" default="NO">
      <analytic>
        <title level="a">Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves</title>
        <author>
          <persName key="tanc-2007-idm335718029328">
            <foreName>B.</foreName>
            <surname>Smith</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr id="rid01201" x-editorial-board="yes" x-international-audience="yes">
        <idno type="issn">0933-2790</idno>
        <title level="j">J. of Cryptology</title>
        <note type="bnote" anchored="yes" place="unspecified">To appear</note>
        <imprint>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid58" type="inproceedings" rend="year" n="cite:Enge08" default="NO">
      <analytic>
        <title level="a">Discrete logarithms in curves over finite fields</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>Andreas</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
        </author>
      </analytic>
      <monogr x-international-audience="yes" x-proceedings="yes" x-invited-conference="yes">
        <editor role="editor">
          <persName>
            <foreName>Gary L.</foreName>
            <surname>Mullen</surname>
            <initial>G. L.</initial>
          </persName>
          <persName>
            <foreName>Daniel</foreName>
            <surname>Panario</surname>
            <initial>D.</initial>
          </persName>
          <persName key="tanc-2007-idm335718026272">
            <foreName>Igor E.</foreName>
            <surname>Shparlinski</surname>
            <initial>I. E.</initial>
          </persName>
        </editor>
        <title level="m">Finite Fields and Applications</title>
        <title level="s">Contemporary Mathematics</title>
        <imprint>
          <biblScope type="volume">461</biblScope>
          <publisher>
            <orgName>American Mathematical Society</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2008</year>
          </dateStruct>
          <biblScope type="pages">119–139</biblScope>
        </imprint>
        <meeting id="cid281283">
          <title>International Conference on Finite Fields and Applications</title>
          <num>9</num>
          <abbr type="sigle">FQ</abbr>
        </meeting>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid59" type="article" rend="refer" n="refercite:Morain04" default="NO">
      <analytic>
        <title level="a">La primalité en temps polynomial [d'après Adleman, Huang; Agrawal, Kayal, Saxena]</title>
        <author>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Astérisque</title>
        <note type="bnote" anchored="yes" place="unspecified">Séminaire Bourbaki. Vol. 2002/2003</note>
        <imprint>
          <biblScope type="number">294</biblScope>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <biblScope type="pages">Exp. No. 917, 205–230</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid6" type="inproceedings" rend="foot" n="footcite:Gaudry02" default="NO">
      <analytic>
        <title level="a">A comparison and a combination of SST and AGM algorithms for counting points of elliptic curves in characteristic 2</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>Y.</foreName>
            <surname>Zheng</surname>
            <initial>Y.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology – ASIACRYPT 2002</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">2501</biblScope>
          <publisher>
            <orgName>Springer–Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2002</year>
          </dateStruct>
          <biblScope type="pages">311–327</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid60" type="article" rend="refer" n="refercite:es04" default="NO">
      <analytic>
        <title level="a">Constructing elliptic curves over finite fields using double eta-quotients</title>
        <author>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>R.</foreName>
            <surname>Schertz</surname>
            <initial>R.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal de Théorie des Nombres de Bordeaux</title>
        <imprint>
          <biblScope type="volume">16</biblScope>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <biblScope type="pages">555–568</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Andreas.Enge/vorabdrucke/cm.ps.gz" location="extern" xyref="2854538732028">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Andreas. 
          <allowbreak/>Enge/ 
          <allowbreak/>vorabdrucke/ 
          <allowbreak/>cm. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid61" type="article" rend="refer" n="refercite:BaEnFaGu05" default="NO">
      <analytic>
        <title level="a">The Arithmetic of Jacobian Groups of Superelliptic Cubics</title>
        <author>
          <persName>
            <foreName>A.</foreName>
            <surname>Basiri</surname>
            <initial>A.</initial>
          </persName>
          <persName key="tanc-2006-idm182960489552">
            <foreName>A.</foreName>
            <surname>Enge</surname>
            <initial>A.</initial>
          </persName>
          <persName>
            <foreName>J.-C.</foreName>
            <surname>Faugère</surname>
            <initial>J.-C.</initial>
          </persName>
          <persName key="tanc-2006-idm182960476944">
            <foreName>N.</foreName>
            <surname>Gürel</surname>
            <initial>N.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">74</biblScope>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
          <biblScope type="pages">389–410</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="https://hal.inria.fr/inria-00071967" location="extern">https:// 
          <allowbreak/>hal. 
          <allowbreak/>inria. 
          <allowbreak/>fr/ 
          <allowbreak/>inria-00071967</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid62" type="article" rend="refer" n="refercite:Morain07b" default="NO">
      <analytic>
        <title level="a">Computing the cardinality of CM elliptic curves using torsion points</title>
        <author>
          <persName key="tanc-2006-idm182960493376">
            <foreName>F.</foreName>
            <surname>Morain</surname>
            <initial>F.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Journal de Théorie des Nombres de Bordeaux</title>
        <imprint>
          <biblScope type="volume">19</biblScope>
          <biblScope type="number">3</biblScope>
          <dateStruct>
            <year full="yes">2007</year>
          </dateStruct>
          <biblScope type="pages">663–681</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://arxiv.org/ps/math.NT/0210173" location="extern" xyref="1621689859029">http:// 
          <allowbreak/>arxiv. 
          <allowbreak/>org/ 
          <allowbreak/>ps/ 
          <allowbreak/>math. 
          <allowbreak/>NT/ 
          <allowbreak/>0210173</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid7" type="inproceedings" rend="foot" n="footcite:GaSc04" default="NO">
      <analytic>
        <title level="a">Construction of Secure Random Curves of Genus 2 over Prime Fields</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>É.</foreName>
            <surname>Schost</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <editor role="editor">
          <persName>
            <foreName>C.</foreName>
            <surname>Cachin</surname>
            <initial>C.</initial>
          </persName>
          <persName>
            <foreName>J.</foreName>
            <surname>Camenisch</surname>
            <initial>J.</initial>
          </persName>
        </editor>
        <title level="m">Advances in Cryptology – EUROCRYPT 2004</title>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">3027</biblScope>
          <publisher>
            <orgName>Springer-Verlag</orgName>
          </publisher>
          <dateStruct>
            <year full="yes">2004</year>
          </dateStruct>
          <biblScope type="pages">239–256</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Pierrick.Gaudry/publis/secureg2.ps.gz" location="extern" xyref="4205299064001">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Pierrick. 
          <allowbreak/>Gaudry/ 
          <allowbreak/>publis/ 
          <allowbreak/>secureg2. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid8" type="article" rend="foot" n="footcite:GaSc05" default="NO">
      <analytic>
        <title level="a">Modular equations for hyperelliptic curves</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName>
            <foreName>É.</foreName>
            <surname>Schost</surname>
            <initial>É.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Math. Comp.</title>
        <imprint>
          <biblScope type="volume">74</biblScope>
          <dateStruct>
            <year full="yes">2005</year>
          </dateStruct>
          <biblScope type="pages">429–454</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.lix.polytechnique.fr/Labo/Pierrick.Gaudry/publis/eqmod2.ps.gz" location="extern" xyref="1987448492005">http:// 
          <allowbreak/>www. 
          <allowbreak/>lix. 
          <allowbreak/>polytechnique. 
          <allowbreak/>fr/ 
          <allowbreak/>Labo/ 
          <allowbreak/>Pierrick. 
          <allowbreak/>Gaudry/ 
          <allowbreak/>publis/ 
          <allowbreak/>eqmod2. 
          <allowbreak/>ps. 
          <allowbreak/>gz</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct id="tanc-2008-bid9" type="article" rend="foot" n="footcite:GaGu03" default="NO">
      <analytic>
        <title level="a">Counting points in medium characteristic using Kedlaya's algorithm</title>
        <author>
          <persName key="spaces-2006-idm18803813792">
            <foreName>P.</foreName>
            <surname>Gaudry</surname>
            <initial>P.</initial>
          </persName>
          <persName key="tanc-2006-idm182960476944">
            <foreName>N.</foreName>
            <surname>Gürel</surname>
            <initial>N.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="j">Experiment. Math.</title>
        <imprint>
          <biblScope type="volume">12</biblScope>
          <biblScope type="number">4</biblScope>
          <dateStruct>
            <year full="yes">2003</year>
          </dateStruct>
          <biblScope type="pages">395–402</biblScope>
          <ref xmlns:xlink="http://www.w3.org/1999/xlink" xlink:href="http://www.expmath.org/expmath/volumes/12/12.html" location="extern" xyref="2891325306018">http:// 
          <allowbreak/>www. 
          <allowbreak/>expmath. 
          <allowbreak/>org/ 
          <allowbreak/>expmath/ 
          <allowbreak/>volumes/ 
          <allowbreak/>12/ 
          <allowbreak/>12. 
          <allowbreak/>html</ref>
        </imprint>
      </monogr>
    </biblStruct>
    <biblStruct dedoublkey="3107" id="tanc-2008-c-bid0" PRJ="tanc" n="cite:Smith08Eurocrypt" rend="consolide" type="inbook">
      <analytic>
        <title level="a">Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves</title>
        <author>
          <persName key="tanc-2007-idm335718029328">
            <foreName>Benjamin</foreName>
            <surname>Smith</surname>
            <initial>B.</initial>
          </persName>
        </author>
      </analytic>
      <monogr>
        <title level="s">Lecture Notes in Comput. Sci.</title>
        <imprint>
          <biblScope type="volume">4965</biblScope>
          <dateStruct>
            <year>2008</year>
          </dateStruct>
          <biblScope type="pages">163-180</biblScope>
        </imprint>
      </monogr>
    </biblStruct>
  </biblio>
</raweb>
