Handbook of Elliptic and Hyperelliptic Curve Cryptography

From MaRDI portal
Publication:5316732

DOI10.1201/9781420034981zbMath1082.94001OpenAlexW1592482282MaRDI QIDQ5316732

No author found.

Publication date: 15 September 2005

Full work available at URL: https://doi.org/10.1201/9781420034981




Related Items (only showing first 100 items - show all)

Hashing to elliptic curves of \(j\)-invariant 1728Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curvesA theta model for elliptic curvesGroup Law Computations on Jacobians of Hyperelliptic CurvesSublinear Scalar Multiplication on Hyperelliptic Koblitz CurvesOptimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic CurvesMemory-saving computation of the pairing final exponentiation on BN curvesLinear complexity of some sequences derived from hyperelliptic curves of genus 2On the 2-adic valuation of the cardinality of elliptic curves over finite extensions of \(\mathbb{F}_{q}\)Nonlinearities in elliptic curve authenticationDynamical directions in numerationMultibase scalar multiplications in cryptographic pairingsOn the size of the Jacobians of curves over finite fieldsEven faster integer multiplicationHyperelliptic curves and their invariants: geometric, arithmetic and algorithmic aspectsImproving the arithmetic of elliptic curves in the Jacobi modelOn the number of distinct elliptic curves in some familiesThe \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curvesA review on the isomorphism classes of hyperelliptic curves of genus 2 over finite fields admitting a Weierstrass pointA deterministic algorithm for the discrete logarithm problem in a semigroupBäcklund transformations for the nonholonomic Veselova systemComputing zeta functions of large polynomial systems over finite fieldsFast elliptic curve point multiplication based on binary and binary non-adjacent scalar form methodsEfficient 3-dimensional GLV method for faster point multiplication on some GLS elliptic curvesIsolated elliptic curves and the MOV attackNon-commutative digit expansions for arithmetic on supersingular elliptic curvesAnalysis of the width-\(w\) non-adjacent form in conjunction with hyperelliptic curve cryptography and with latticesIsogenies of abelian varieties over finite fieldsNormal forms of hyperelliptic curves of genus 3Attacking the linear congruential generator on elliptic curves via lattice techniquesEfficiently computable endomorphism for genus 3 hyperelliptic curve cryptosystemsQuantum algorithm for solving hyperelliptic curve discrete logarithm problemHorizontal collision correlation attack on elliptic curvesA survey of fault attacks in pairing based cryptographyScalable zero knowledge via cycles of elliptic curvesOn the distribution of Atkin and Elkies primesImproved complexity bounds for counting points on hyperelliptic curvesIndex calculus in the trace zero varietyGenus 2 point counting over prime fieldsComputing zeta functions of superelliptic curves in larger characteristicComputing bilinear pairings on elliptic curves with automorphismsRedundant \(\tau \)-adic expansions. I: Non-adjacent digit sets and their applications to scalar multiplicationSpeeding up elliptic curve discrete logarithm computations with point halvingBounds and trade-offs for double-base number systemsFaster pairing computation on genus \(2\) hyperelliptic curvesFaster computation of the Tate pairingA CM construction for curves of genus 2 with \(p\)-rank 1Elliptic curve discrete logarithm problem over small degree extension fieldsOn the distribution of the coefficients of normal forms for Frobenius expansionsRecent progress on the elliptic curve discrete logarithm problemBäcklund transformations and divisor doublingOn the probability of generating a latticeOn Edwards curves and ZVP-attacksEndomorphisms for faster elliptic curve cryptography on a large class of curvesParallelizing pairings on Hessian elliptic curvesElliptic nets and elliptic curvesThe pairing computation on Edwards curvesRedundancy of minimal weight expansions in Pisot basesAn ID-based signcryption scheme with compartmented secret sharing for unsigncryptionA binary algorithm with low divergence for modular inversion on SIMD architecturesMemoryless near-collisions via coding theoryPoint counting in families of hyperelliptic curvesOn multi-language abstraction. Towards a static analysis of multi-language programsExtending the GLS endomorphism to speed up GHS Weil descent using MagmaTrisection for genus 2 curves in odd characteristicChoosing and generating parameters for pairing implementation on BN curvesRefinement of the four-dimensional GLV method on elliptic curvesHigher-dimensional 3-adic CM constructionAn optimal representation for the trace zero subgroupMultiple point compression on elliptic curvesToric forms of elliptic curves and their arithmeticFast arithmetic in unramified \(p\)-adic fieldsAutomatic synthesis of quantum circuits for point addition on ordinary binary elliptic curvesComplete classification of torsion of elliptic curves over quadratic cyclotomic fieldsProtecting ECC against fault attacks: the ring extension method revisitedRamanujan's class invariants and their use in elliptic curve cryptographySome properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curvesReconstructing plane quartics from their invariantsDiscretization of Hamiltonian systems and intersection theorySuperintegrable systems with algebraic and rational integrals of motionComparison of scalar multiplication on real hyperelliptic curvesPairing inversion for finding discrete logarithmsLow-cost addition-subtraction sequences for the final exponentiation in pairingsA generalisation of Miller's algorithm and applications to pairing computations on abelian varietiesComputing pairings using \(x\)-coordinates onlyInferring sequences produced by a linear congruential generator on elliptic curves missing high-order bitsThe arithmetic of characteristic 2 Kummer surfaces and of elliptic Kummer linesNoncanonical number systems in the integersCounting points on hyperelliptic curves with explicit real multiplication in arbitrary genusOn bilinear structures on divisor class groupsComputing projective equivalences of planar curves birationally equivalent to elliptic and hyperelliptic curvesQuasi-quadratic elliptic curve point counting using rigid cohomologyBisection for genus 2 curves in odd characteristicSuper-isolated abelian varietiesA probabilistic analysis on a lattice attack against DSAEfficient arithmetic in (pseudo-)Mersenne prime order fieldsStill wrong use of pairings in cryptographyStrong pseudoprimes to base 2Computing discrete logarithms in the Jacobian of high-genus hyperelliptic curves over even characteristic finite fieldsOn the arithmetic operations over finite fields of characteristic three with low complexity




This page was built for publication: Handbook of Elliptic and Hyperelliptic Curve Cryptography