A normal form for elliptic curves
From MaRDI portal
Publication:5423970
DOI10.1090/S0273-0979-07-01153-6zbMath1134.14308WikidataQ56866420 ScholiaQ56866420MaRDI QIDQ5423970
Publication date: 1 November 2007
Published in: Bulletin of the American Mathematical Society (Search for Journal in Brave)
Related Items
A theta model for elliptic curves ⋮ Reducible Abelian varieties and Lax matrices for Euler’s problem of two fixed centres ⋮ A complete set of addition laws for twisted jacobi intersection curves ⋮ On Various Families of Twisted Jacobi Quartics ⋮ Edwards curves and Gaussian hypergeometric series ⋮ Small scalar multiplication on Weierstrass curves using division polynomials ⋮ Curve448 on 32-bit ARM Cortex-M4 ⋮ Explicit construction of the square-root Vélu's formula on Edwards curves ⋮ Euler's lute and Edwards's oud ⋮ Formal Proof of the Group Law for Edwards Elliptic Curves ⋮ A first integrability result for Miquel dynamics ⋮ On the linear complexity profile of some sequences derived from elliptic curves ⋮ Pairing Computation on Edwards Curves with High-Degree Twists ⋮ Decaf: Eliminating Cofactors Through Point Compression ⋮ Elliptic divisibility sequences over the Edwards model of elliptic curves ⋮ On the number of distinct elliptic curves in some families ⋮ Interrelation of families of points of high order on the Edwards curve over a prime field ⋮ Algorithms for base point generation on an Edwards curve with the use of point divisibility criteria ⋮ SOME ARITHMETICAL PROPERTIES ON HYPERBOLA ⋮ The complete cost of cofactor \(h=1\) ⋮ Subgroup Security in Pairing-Based Cryptography ⋮ Twisted Hessian Curves ⋮ An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform ⋮ Horizontal collision correlation attack on elliptic curves ⋮ An application of crypto cloud computing in social networks by cooperative game theory ⋮ Twisted Edwards Curves ⋮ Factorization of complex analytic functions algebraically dependent on space curves and applications to compatible functional and differential equations ⋮ On isogeny classes of Edwards curves over finite fields ⋮ Isomorphism classes of Edwards curves over finite fields ⋮ Isogeny formulas for Jacobi intersection and twisted Hessian curves ⋮ An analog of the Edwards model for Jacobians of genus 2 curves ⋮ A note on inverted twisted Edwards curve ⋮ A formula for disaster: a unified approach to elliptic curve special-point-based attacks ⋮ Twisted edwards curve over the ring ⋮ Faster computation of the Tate pairing ⋮ A complete set of addition laws for incomplete Edwards curves ⋮ Addition law structure of elliptic curves ⋮ Two kinds of division polynomials for twisted Edwards curves ⋮ JKL-ECM: an implementation of ECM using Hessian curves ⋮ On Edwards curves and ZVP-attacks ⋮ Endomorphisms for faster elliptic curve cryptography on a large class of curves ⋮ Unnamed Item ⋮ The pairing computation on Edwards curves ⋮ Isomorphic transformations of an elliptic curve over a finite field ⋮ Inverted Edwards Coordinates ⋮ Connecting Legendre with Kummer and Edwards ⋮ Faster Addition and Doubling on Elliptic Curves ⋮ How to construct CSIDH on Edwards curves ⋮ Using symmetries in the index calculus for elliptic curves discrete logarithm ⋮ Efficient message transmission via twisted Edwards curves ⋮ Arithmetic of Split Kummer Surfaces: Montgomery Endomorphism of Edwards Products ⋮ On Randomness Extraction in Elliptic Curves ⋮ An exploration of affine group laws for elliptic curves ⋮ ECM using Edwards curves ⋮ Number of curves in the generalized Edwards form with minimal even cofactor of the curve order ⋮ Twisted $${\mu }_4$$ -Normal Form for Elliptic Curves ⋮ A new public key cryptosystem based on Edwards curves ⋮ On Cycles of Pairing-Friendly Elliptic Curves ⋮ Huff’s Model for Elliptic Curves ⋮ Protecting ECC against fault attacks: the ring extension method revisited ⋮ Twisted Edwards Curves Revisited ⋮ Pairing Computation on Twisted Edwards Form Elliptic Curves ⋮ Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves ⋮ Exact number of elliptic curves in the canonical form, which are isomorphic to Edwards curves over prime field ⋮ Cryptography on twisted Edwards curves over local fields ⋮ Isogenies on twisted Hessian curves ⋮ О вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координат ⋮ Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication ⋮ Arithmetic of the level four theta model of elliptic curves ⋮ ECM on Graphics Cards ⋮ Four-dimensional Gallant-Lambert-Vanstone scalar multiplication ⋮ Deterministic Encoding into Twisted Edwards Curves ⋮ What about Vulnerability to a Fault Attack of the Miller’s Algorithm During an Identity Based Protocol? ⋮ Faster cofactorization with ECM using mixed representations ⋮ Eliptic curves in post-quantum cryptography ⋮ Scalar multiplication for twisted Edwards curves using the extended double-base number system ⋮ Another Approach to Pairing Computation in Edwards Coordinates ⋮ A mean value formula for elliptic curves ⋮ High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications ⋮ Bitcoin security with a twisted Edwards curve ⋮ Diophantine triples and \(K3\) surfaces ⋮ Constructing abelian surfaces for cryptography via Rosenhain invariants
Cites Work