Elliptic and hyperelliptic curves: a practical security analysis
From MaRDI portal
Publication:5402972
DOI10.1007/978-3-642-54631-0_12zbMATH Open1291.94061OpenAlexW1552628852MaRDI QIDQ5402972FDOQ5402972
Authors: Joppe W. Bos, Craig Costello, Andrea Miele
Publication date: 25 March 2014
Published in: Public-Key Cryptography – PKC 2014 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-54631-0_12
Recommendations
Cited In (16)
- Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
- Recent progress on the elliptic curve discrete logarithm problem
- Fast cryptography in genus 2
- Title not available (Why is that?)
- Constructing hyperelliptic covers for elliptic curves over quadratic extension fields
- Quantum algorithm for solving hyperelliptic curve discrete logarithm problem
- Title not available (Why is that?)
- Title not available (Why is that?)
- On the security properties of Russian standardized elliptic curves
- On the heuristic of approximating polynomials over finite fields by random mappings
- DiSSECT: distinguisher of standard and simulated elliptic curves via traits
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- The Equivalence between the DHP and DLP for Elliptic Curves Used in Practical Applications
- Quantum circuits for hyperelliptic curve discrete logarithms over the mersenne prime fields
- Hyper-and-elliptic-curve cryptography
- Title not available (Why is that?)
This page was built for publication: Elliptic and hyperelliptic curves: a practical security analysis
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5402972)