[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Fast genus 2 arithmetic based on Theta functions

P Gaudry - Journal of Mathematical Cryptology, 2007 - degruyter.com
In 1986, DV Chudnovsky and GV Chudnovsky proposed to use formulae coming from Theta
functions for the arithmetic in Jacobians of genus 2 curves. We follow this idea and derive …

A privacy-preserving approach to policy-based content dissemination

N Shang, M Nabeel, F Paci… - 2010 IEEE 26th …, 2010 - ieeexplore.ieee.org
We propose a novel scheme for selective distribution of content, encoded as documents,
that preserves the privacy of the users to whom the documents are delivered and is based …

Genus 2 point counting over prime fields

P Gaudry, É Schost - Journal of Symbolic Computation, 2012 - Elsevier
For counting points of Jacobians of genus 2 curves over a large prime field, the best known
approach is essentially an extension of Schoof's genus 1 algorithm. We propose various …

Linear recurrences with polynomial coefficients and application to integer factorization and Cartier–Manin operator

A Bostan, P Gaudry, É Schost - SIAM Journal on Computing, 2007 - SIAM
We study the complexity of computing one or several terms (not necessarily consecutive) in
a recurrence with polynomial coefficients. As applications, we improve the best currently …

Aspects of hyperelliptic curves over large prime fields in software implementations

RM Avanzi - … Hardware and Embedded Systems-CHES 2004: 6th …, 2004 - Springer
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3
over prime fields. To achieve a fair comparison between the different types of groups, we …

[PDF][PDF] Trustless Groups of Unknown Order with Hyperelliptic Curves.

S Dobson, SD Galbraith, B Smith - IACR Cryptol. ePrint Arch., 2020 - scholar.archive.org
Groups of unknown order are of major interest due to their applications including time-lock
puzzles, verifiable delay functions, and accumulators. In this paper we focus on trustless …

Fast computation of special resultants

A Bostan, P Flajolet, B Salvy, É Schost - Journal of Symbolic Computation, 2006 - Elsevier
We propose fast algorithms for computing composed products and composed sums, as well
as diamond products of univariate polynomials. These operations correspond to special …

Trustless unknown-order groups

S Dobson, S Galbraith, B Smith - arXiv preprint arXiv:2211.16128, 2022 - arxiv.org
Groups of unknown order are of major interest due to their applications including time-lock
puzzles, verifiable delay functions, and accumulators. In this paper we focus on trustless …