Evidence that XTR is more secure than supersingular elliptic curve cryptosystems

From MaRDI portal
Publication:1772226

DOI10.1007/s00145-004-0313-xzbMath1075.94011OpenAlexW2101458679MaRDI QIDQ1772226

Eric R. Verheul

Publication date: 15 April 2005

Published in: Journal of Cryptology (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/s00145-004-0313-x




Related Items (25)

Pairing-based cryptography on elliptic curvesOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesTrapdoor DDH groups from pairings and isogeniesXTR Algorithm: Efficient and Compact Subgroup Trace RepresentationCryptanalysis of Pairing-Based Cryptosystems Over Small Characteristic FieldsShorter identity-based encryption via asymmetric pairingsEfficiently Computable Distortion Maps for Supersingular CurvesElliptic curves withj= 0,1728 and low embedding degreeAn improved two-party identity-based authenticated key agreement protocol using pairingsElliptic curve cryptography: the serpentine course of a paradigm shiftHeuristics of the Cocks-Pinch methodDesign of improved password authentication and update scheme based on elliptic curve cryptographyAlgebraic curves and cryptographyEfficient Compression of SIDH Public KeysOn the elliptic curves \(y^{2}=x^{3} - c\) with embedding degree oneA taxonomy of pairing-friendly elliptic curvesThe Hidden Root ProblemPairing Computation on Twisted Edwards Form Elliptic CurvesRevisiting Pairing Based Group Key ExchangeAn Analysis of the Vector Decomposition ProblemThe Diffie-Hellman problem and generalization of Verheul's theoremEfficient Pairing Computation on Ordinary Elliptic Curves of Embedding Degree 1 and 2Efficient Algorithms for Supersingular Isogeny Diffie-HellmanA Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor NetworksCompact hierarchical identity-based encryption based on a harder decisional problem




This page was built for publication: Evidence that XTR is more secure than supersingular elliptic curve cryptosystems