[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Four: four-dimensional decompositions on a-curve over the mersenne prime

C Costello, P Longa - International Conference on the Theory and …, 2015 - Springer
We introduce Four Q, a high-security, high-performance elliptic curve that targets the 128-bit
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …

[图书][B] p-adic Differential Equations

KS Kedlaya - 2022 - books.google.com
Now in its second edition, this volume provides a uniquely detailed study of $ P $-adic
differential equations. Assuming only a graduate-level background in number theory, the text …

Four on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks

Z Liu, P Longa, GCCF Pereira… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
This work deals with the energy-efficient, high-speed and high-security implementation of
elliptic curve scalar multiplication, elliptic curve Diffie-Hellman (ECDH) key exchange and …

Fast cryptography in genus 2

JW Bos, C Costello, H Hisil, K Lauter - Journal of Cryptology, 2016 - Springer
In this paper, we highlight the benefits of using genus 2 curves in public-key cryptography.
Compared to the standardized genus 1 curves, or elliptic curves, arithmetic on genus 2 …

Kummer strikes back: new DH speed records

DJ Bernstein, C Chuengsatiansup, T Lange… - Advances in Cryptology …, 2014 - Springer
This paper sets new speed records for high-security constant-time variable-base-point Diffie–
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …

Curve41417: Karatsuba revisited

DJ Bernstein, C Chuengsatiansup, T Lange - Cryptographic Hardware and …, 2014 - Springer
This paper introduces constant-time ARM Cortex-A8 ECDH software that (1) is faster than
the fastest ECDH option in the latest version of OpenSSL but (2) achieves a security level …

[PDF][PDF] Efficient algorithms for abelian varieties and their moduli spaces

D Robert - 2021 - hal.science
Efficient algorithms for abelian varieties and their moduli spaces Page 1 HAL Id: tel-03498268
https://hal.science/tel-03498268 Submitted on 20 Dec 2021 HAL is a multi-disciplinary open …

[PDF][PDF] Trustless Groups of Unknown Order with Hyperelliptic Curves.

S Dobson, SD Galbraith, B Smith - IACR Cryptol. ePrint Arch., 2020 - scholar.archive.org
Groups of unknown order are of major interest due to their applications including time-lock
puzzles, verifiable delay functions, and accumulators. In this paper we focus on trustless …

Trustless unknown-order groups

S Dobson, S Galbraith, B Smith - arXiv preprint arXiv:2211.16128, 2022 - arxiv.org
Groups of unknown order are of major interest due to their applications including time-lock
puzzles, verifiable delay functions, and accumulators. In this paper we focus on trustless …