Elliptic and hyperelliptic curves: a practical security analysis
From MaRDI portal
Recommendations
Cited in
(16)- Recent progress on the elliptic curve discrete logarithm problem
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
- Fast cryptography in genus 2
- scientific article; zbMATH DE number 2043310 (Why is no real title available?)
- Constructing hyperelliptic covers for elliptic curves over quadratic extension fields
- Quantum algorithm for solving hyperelliptic curve discrete logarithm problem
- scientific article; zbMATH DE number 5636731 (Why is no real title available?)
- scientific article; zbMATH DE number 6262935 (Why is no real title available?)
- On the security properties of Russian standardized elliptic curves
- On the heuristic of approximating polynomials over finite fields by random mappings
- DiSSECT: distinguisher of standard and simulated elliptic curves via traits
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications
- Hyper-and-elliptic-curve cryptography
- Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields
- scientific article; zbMATH DE number 5708050 (Why is no real title available?)
This page was built for publication: Elliptic and hyperelliptic curves: a practical security analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402972)