Hyper-and-elliptic-curve cryptography
From MaRDI portal
Publication:2878835
DOI10.1112/S1461157014000394zbMath1296.94083MaRDI QIDQ2878835
Daniel J. Bernstein, Tanja Lange
Publication date: 5 September 2014
Published in: LMS Journal of Computation and Mathematics (Search for Journal in Brave)
elliptic-curve cryptographymulti-scalar multiplicationvariable-base-point single-scalar multiplication
Cryptography (94A60) Curves over finite and local fields (11G20) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items (4)
On the statistical leak of the GGH13 multilinear map and some variants ⋮ Some techniques for faster scalar multiplication on GLS curves ⋮ Computing supersingular isogenies on Kummer surfaces ⋮ Constructing Jacobian varieties with many elliptic curves
Uses Software
Cites Work
- Cryptographic hardware and embedded systems -- CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20--23, 2013. Proceedings
- Genus 2 point counting over prime fields
- Topics in cryptology -- CT-RSA 2012. The cryptographers' track at the RSA conference 2012, San Francisco, CA, USA, February 27--March 2, 2012. Proceedings
- Advances in cryptology -- EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26--30, 2009. Proceedings
- Advances in cryptology -- CRYPTO '85. Proceedings. (A Conference on the Theory and Application of Cryptographic techniques held at the University of California, Santa Barbara, August 18--22, 1985)
- The Magma algebra system. I: The user language
- Constructive and destructive facets of Weil descent on elliptic curves
- Sequences of numbers generated by addition in formal groups and new primality and factorization tests
- Constructing pairing-friendly hyperelliptic curves using Weil restriction
- Factorization with genus 2 curves
- New directions in cryptography
- Fast genus 2 arithmetic based on Theta functions
This page was built for publication: Hyper-and-elliptic-curve cryptography