Elliptic curve cryptography

D Hankerson, A Menezes - Encyclopedia of Cryptography, Security and …, 2021 - Springer
Background Elliptic curve cryptographic schemes were proposed independently in 1985 by
Neal Koblitz (Koblitz 1987) and Victor Miller (Miller 1986). They are the elliptic curve …

[图书][B] Handbook of finite fields

GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …

Genus 2 point counting over prime fields

P Gaudry, É Schost - Journal of Symbolic Computation, 2012 - Elsevier
For counting points of Jacobians of genus 2 curves over a large prime field, the best known
approach is essentially an extension of Schoof's genus 1 algorithm. We propose various …

Index calculus attack for hyperelliptic curves of small genus

N Thériault - International Conference on the Theory and …, 2003 - Springer
We present a variation of the index calculus attack by Gaudry which can be used to solve the
discrete logarithm problem in the Jacobian of hyperelliptic curves. The new algorithm has a …

Computing parametric geometric resolutions

É Schost - Applicable Algebra in Engineering, Communication …, 2003 - Springer
Given a polynomial system of n equations in n unknowns that depends on some parameters,
we define the notion of parametric geometric resolution as a means to represent some …

Linear recurrences with polynomial coefficients and application to integer factorization and Cartier–Manin operator

A Bostan, P Gaudry, É Schost - SIAM Journal on Computing, 2007 - SIAM
We study the complexity of computing one or several terms (not necessarily consecutive) in
a recurrence with polynomial coefficients. As applications, we improve the best currently …

Aspects of hyperelliptic curves over large prime fields in software implementations

RM Avanzi - … Hardware and Embedded Systems-CHES 2004: 6th …, 2004 - Springer
We present an implementation of elliptic curves and of hyperelliptic curves of genus 2 and 3
over prime fields. To achieve a fair comparison between the different types of groups, we …

Hyperelliptic curve cryptosystems: Closing the performance gap to elliptic curves

J Pelzl, T Wollinger, J Guajardo, C Paar - Cryptographic Hardware and …, 2003 - Springer
For most of the time since they were proposed, it was widely believed that hyperelliptic curve
cryptosystems (HECC) carry a substantial performance penalty compared to elliptic curve …

[PDF][PDF] Trustless Groups of Unknown Order with Hyperelliptic Curves.

S Dobson, SD Galbraith, B Smith - IACR Cryptol. ePrint Arch., 2020 - scholar.archive.org
Groups of unknown order are of major interest due to their applications including time-lock
puzzles, verifiable delay functions, and accumulators. In this paper we focus on trustless …

Constructing hyperelliptic curves of genus 2 suitable for cryptography

A Weng - Mathematics of Computation, 2003 - ams.org
CONSTRUCTING HYPERELLIPTIC CURVES OF GENUS 2 SUITABLE FOR
CRYPTOGRAPHY 1. Introduction In 1986 Atkin [1] proposed an algorithm f Page 1 …