Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography
From MaRDI portal
Publication:4972532
DOI10.1080/10586458.2017.1412371zbMath1425.11192arXiv1705.02316OpenAlexW2963600274MaRDI QIDQ4972532
Publication date: 25 November 2019
Published in: Experimental Mathematics (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/1705.02316
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Abelian varieties of dimension (> 1) (11G10)
Related Items
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Isogenies and the discrete logarithm problem in Jacobians of genus 3 hyperelliptic curves
- Nonsingular plane cubic curves over finite fields
- Hyperelliptic cryptosystems
- Efficient ephemeral elliptic curve cryptographic keys
- Elliptic curve cryptography: the serpentine course of a paradigm shift
- Cryptographic implications of Hess' generalized GHS attack
- A complete determination of the complex quadratic fields of class-number one
- Isogeny classes of abelian varieties over finite fields
- Computing discrete logarithms in high-genus hyperelliptic Jacobians in provably subexponential time
- Integer-Valued Polynomials
- Kummer Strikes Back: New DH Speed Records
- A Heuristic Asymptotic Formula Concerning the Distribution of Prime Numbers
- A double large prime variation for small genus hyperelliptic index calculus
- The Arithmetic of Elliptic Curves
- The Determination of the Imaginary Abelian Number Fields with Class Number One
- Reducing elliptic curve logarithms to logarithms in a finite field
- Determination of all non-normal quartic CM-fields and of all non-abelian normal octic CM-fields with class number one
- Advanced Topics in Computional Number Theory
- Handbook of Elliptic and Hyperelliptic Curve Cryptography
- Abelian Surfaces over Finite Fields as Jacobians
- Abelian varieties over finite fields
This page was built for publication: Super-Isolated Elliptic Curves and Abelian Surfaces in Cryptography