Handbook of Elliptic and Hyperelliptic Curve Cryptography

From MaRDI portal
Revision as of 22:36, 8 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:5316732

DOI10.1201/9781420034981zbMath1082.94001OpenAlexW1592482282MaRDI QIDQ5316732

No author found.

Publication date: 15 September 2005

Full work available at URL: https://doi.org/10.1201/9781420034981




Related Items (only showing first 100 items - show all)

Elliptic curve cryptography arithmetic in terms of one variable polynomial divisionNew bi-Hamiltonian systems on the planeHECC (Hyperelliptic Curve Cryptography)Correspondences on Hyperelliptic Curves and Applications to the Discrete LogarithmCompositeness test with nodal curvesLow-Weight Primes for Lightweight Elliptic Curve Cryptography on 8-bit AVR ProcessorsFinding elliptic curves with a subgroup of prescribed sizeA relation between embedding degrees and class numbers of binary quadratic formsImplementation of point-counting algorithms on genus 2 hyperelliptic curves based on the birthday paradoxUnnamed ItemOn exact discretization of cubic-quintic Duffing oscillatorFast Implementation of Curve25519 Using AVX2Failure of the Point Blinding Countermeasure Against Fault Attack in Pairing-Based CryptographyComputational Number Theory, Past, Present, and FutureOptimal generic attack against basic Boneh-Boyen signaturesThe "Elliptic" matrices and a new kind of cryptographyAcceleration of Index Calculus for Solving ECDLP over Prime Fields and Its LimitationExtractors for Jacobians of Binary Genus-2 Hyperelliptic CurvesFast Jacobian arithmetic for hyperelliptic curves of genus 3Products of hyperelliptic Jacobians with maximal Galois imageUnnamed ItemMontgomery Ladder for All Genus 2 Curves in Characteristic 2Transformation of the Stäckel matrices preserving superintegrabilityAn Improvement of Optimal Ate Pairing on KSS Curve with Pseudo 12-Sparse MultiplicationEPG-representations with Small Grid-SizeFaster Multiplication in GF(2)[x] ⋮ Computing Hilbert Class PolynomialsComputing Zeta Functions in Families of C a,b Curves Using DeformationOn the number of isogeny classes of pairing-friendly elliptic curves and statistics of MNT curvesConstructing elliptic curves over finite fields with prescribed torsionModular polynomials via isogeny volcanoesReduction of divisors for classical superintegrable GL(3) magnetic chainOn implementation of GHS attack against elliptic curve cryptosystems over cubic extension fields of odd characteristicON THE DISTRIBUTION OF ORDERS OF FROBENIUS ACTION ON ^-TORSION OF ABELIAN SURFACESSupersingular Isogeny-based Cryptography: A SurveyEfficient Self-pairing on Ordinary Elliptic CurvesComputing separable isogenies in quasi-optimal timeTrisection for non-supersingular genus 2 curves in characteristic 2On the computation of coefficients of modular forms: The reduction modulo $p$ approachOn the product of small Elkies primesA Subexponential Algorithm for Evaluating Large Degree IsogeniesTwisted Edwards Curves RevisitedOn the Connection between Kloosterman Sums and Elliptic CurvesExponentiation in Pairing-Friendly Groups Using HomomorphismsSpeeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable AutomorphismsA $p$-adic algorithm to compute the Hilbert class polynomialA generic approach to searching for JacobiansThe double-base number system and its application to elliptic curve cryptographyAn Analysis of the Vector Decomposition ProblemRecognizing hyperelliptic graphs in polynomial timeEphemeral key recovery using index calculus methodExtractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd CharacteristicConstructing Pairing-Friendly Elliptic Curves Using Gröbner Basis ReductionSymbolic Trisection Polynomials for Genus 2 Curves in Odd CharacteristicPower Analysis for Secret Recovering and Reverse Engineering of Public Key AlgorithmsEfficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their ImplementationsО вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координатCryptographic aspects of real hyperelliptic curvesComputing Hilbert class polynomials with the Chinese remainder theoremDouble-Base Number System for Multi-scalar MultiplicationsEndomorphisms for Faster Elliptic Curve Cryptography on a Large Class of CurvesHensel-lifting torsion points on Jacobians and Galois representationsSuper-Isolated Elliptic Curves and Abelian Surfaces in CryptographyWhat about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol?Jacobi Quartic Curves RevisitedFactoring polynomials over finite fieldsOn Modular Decomposition of IntegersPoint Counting in Families of Hyperelliptic Curves in Characteristic 2Hilbert's Seventeenth Problem and Hyperelliptic CurvesA Point Counting Algorithm Using Cohomology with Compact SupportModular Polynomials for Genus 2p-adic class invariantsBoneh-Boyen Signatures and the Strong Diffie-Hellman ProblemGenerating Pairing-Friendly Curves with the CM Equation of Degree 1On the Final Exponentiation for Calculating Pairings on Ordinary Elliptic CurvesFast Hashing to G 2 on Pairing-Friendly CurvesThe infrastructure of a global field of arbitrary unit rankFaster Halvings in Genus 2Efficient Pairing Computation on Genus 2 Curves in Projective CoordinatesLifting and Elliptic Curve Discrete LogarithmsDistinguishing Multiplications from Squaring OperationsHECC Goes Embedded: An Area-Efficient Implementation of HECCDuffing Oscillator and Elliptic Curve CryptographyImproving Smart Card Security Using Elliptic Curve Cryptography over Prime Field (F p )Curves, Jacobians, and cryptographyShort addition sequences for theta functionsSkew Frobenius Map and Efficient Scalar Multiplication for Pairing–Based CryptographyCounting points on hyperelliptic curves of genus 2 with real modelsThe GPS Identification Scheme Using Frobenius ExpansionsSpanning the isogeny class of a power of an elliptic curveComputing 𝐿-polynomials of Picard curves from Cartier–Manin matricesHashing to elliptic curves of \(j\)-invariant 1728Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curvesA theta model for elliptic curvesGroup Law Computations on Jacobians of Hyperelliptic CurvesSublinear Scalar Multiplication on Hyperelliptic Koblitz CurvesOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesMemory-saving computation of the pairing final exponentiation on BN curvesLinear complexity of some sequences derived from hyperelliptic curves of genus 2On the 2-adic valuation of the cardinality of elliptic curves over finite extensions of \(\mathbb{F}_{q}\)






This page was built for publication: Handbook of Elliptic and Hyperelliptic Curve Cryptography