[PDF][PDF] Constructing supersingular elliptic curves

R Bröker - J. Comb. Number Theory, 2009 - Citeseer
We give an algorithm that constructs, on input of a prime power q and an integer t, a
supersingular elliptic curve over Fq with trace of Frobenius t in case such a curve exists. If …

Elliptic curves suitable for pairing based cryptography

F Brezing, A Weng - Designs, Codes and Cryptography, 2005 - Springer
For pairing based cryptography we need elliptic curves defined over finite fields F _ q whose
group order is divisible by some prime ℓ with ℓ| q^ k-1 where k is relatively small. In Barreto …

An extension of Kedlaya's point-counting algorithm to superelliptic curves

P Gaudry, N Gürel - Advances in Cryptology—ASIACRYPT 2001: 7th …, 2001 - Springer
We present an algorithm for counting points on superelliptic curves yr= f (x) over a finite field
F q of small characteristic different from r. This is an extension of an algorithm for …

Computing isogenies between supersingular elliptic curves over

C Delfs, SD Galbraith - Designs, Codes and Cryptography, 2016 - Springer
Abstract Let p> 3 p> 3 be a prime and let EE, E'E′ be supersingular elliptic curves over F _p
F p. We want to construct an isogeny ϕ: E → E'ϕ: E→ E′. The currently fastest algorithm for …

Deuring for the People: Supersingular Elliptic Curves with Prescribed Endomorphism Ring in General Characteristic.

JK Eriksen, L Panny, J Sotáková, M Veroni - IACR Cryptol. ePrint Arch., 2023 - ams.org
Constructing a supersingular elliptic curve whose endomorphism ring is isomorphic to a
given quaternion maximal order (one direction of the Deuring correspondence) is known to …

On Montgomery-Like Representations for Elliptic Curves over GF(2k)

M Stam - Public Key Cryptography—PKC 2003: 6th International …, 2002 - Springer
This paper discusses representations for computation on non-supersingular elliptic curves
over binary fields, where computations are performed on the x-coordinates only. We discuss …

[PDF][PDF] Efficient algorithms for generating elliptic curves over finite fields suitable for use in cryptography

H Baier - 2002 - tuprints.ulb.tu-darmstadt.de
The subject of the thesis at hand is the description of an efficient algorithm for finding an
elliptic curve over a finite prime field of large characteristic suitable for use in cryptography …

Pairing-friendly elliptic curves of prime order

PSLM Barreto, M Naehrig - International workshop on selected areas in …, 2005 - Springer
Previously known techniques to construct pairing-friendly curves of prime or near-prime
order are restricted to embedding degree k\leqslant6. More general methods produce …

Non supersingular elliptic curves for public key cryptosystems

T Beth, F Schaefer - Workshop on the Theory and Application of of …, 1991 - Springer
For public key cryptosystems multiplication on elliptic curves can be used instead of
exponentiation in finite fields. One attack to such a system is: embedding the elliptic curve …

Faster pairings using an elliptic curve with an efficient endomorphism

M Scott - Progress in Cryptology-INDOCRYPT 2005: 6th …, 2005 - Springer
The most significant pairing-based cryptographic protocol to be proposed so far is
undoubtedly the Identity-Based Encryption (IBE) protocol of Boneh and Franklin. In their …