Twisted Edwards Curves

From MaRDI portal
Publication:3506395

DOI10.1007/978-3-540-68164-9_26zbMath1142.94332OpenAlexW2134258244WikidataQ61632462 ScholiaQ61632462MaRDI QIDQ3506395

Marc Joye, Christiane Peters, Daniel J. Bernstein, Tanja Lange, Peter Birkner

Publication date: 13 June 2008

Published in: Progress in Cryptology – AFRICACRYPT 2008 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-540-68164-9_26




Related Items (82)

Arithmetic on abelian and Kummer varietiesKummer versus Montgomery Face-off over Prime Order FieldsOn Various Families of Twisted Jacobi QuarticsEdwards curves and Gaussian hypergeometric seriesSmall scalar multiplication on Weierstrass curves using division polynomialsHigh-throughput elliptic curve cryptography using AVX2 vector instructionsElliptic curve with Optimal mixed Montgomery-Edwards model for low-end devicesFormal Proof of the Group Law for Edwards Elliptic CurvesElliptic Curve Cryptography: A Software ImplementationFurther refinements of Miller's algorithm on Edwards curvesA first integrability result for Miquel dynamicsOn the near prime-order MNT curvesPairing Computation on Edwards Curves with High-Degree TwistsDecaf: Eliminating Cofactors Through Point CompressionThe \(\mathbb Q\)-curve construction for endomorphism-accelerated elliptic curvesNumber of rational points of elliptic curvesA classification of ECM-friendly families of elliptic curves using modular curvesAlgorithms for base point generation on an Edwards curve with the use of point divisibility criteriaThe complete cost of cofactor \(h=1\)The Simplest Protocol for Oblivious TransferTwisted Jacobi intersections curvesOn Near Prime-Order Elliptic Curves with Small Embedding DegreesSome techniques for faster scalar multiplication on GLS curvesAn application of crypto cloud computing in social networks by cooperative game theoryOn isogeny classes of Edwards curves over finite fieldsIsomorphism classes of Edwards curves over finite fieldsIsogeny formulas for Jacobi intersection and twisted Hessian curvesAn analog of the Edwards model for Jacobians of genus 2 curvesA note on inverted twisted Edwards curveSpecial properties of the point addition law for non-cyclic Edwards curvesA formula for disaster: a unified approach to elliptic curve special-point-based attacksFour\(\mathbb {Q}\)NEON: faster elliptic curve scalar multiplications on ARM processorsTwisted edwards curve over the ringPQC CSIKE algorithm on non-cyclic Edwards curvesFaster computation of the Tate pairingA complete set of addition laws for incomplete Edwards curvesAddition law structure of elliptic curvesTwo kinds of division polynomials for twisted Edwards curvesJKL-ECM: an implementation of ECM using Hessian curvesSpeeding up regular elliptic curve scalar multiplication without precomputationOn Edwards curves and ZVP-attacksEndomorphisms for faster elliptic curve cryptography on a large class of curvesUnnamed ItemThe pairing computation on Edwards curvesPractical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ℓIC-DerivativesEPG-representations with Small Grid-SizeConnecting Legendre with Kummer and EdwardsHow to construct CSIDH on Edwards curvesUsing symmetries in the index calculus for elliptic curves discrete logarithmEfficient message transmission via twisted Edwards curvesSide-channel attacks on quantum-resistant supersingular isogeny Diffie-HellmanECM using Edwards curvesNumber of curves in the generalized Edwards form with minimal even cofactor of the curve orderTwisted $${\mu }_4$$ -Normal Form for Elliptic CurvesA new public key cryptosystem based on Edwards curvesOn Cycles of Pairing-Friendly Elliptic CurvesToric forms of elliptic curves and their arithmeticHuff’s Model for Elliptic CurvesProtecting ECC against fault attacks: the ring extension method revisitedTwisted Edwards Curves RevisitedAnalogues of Vélu’s formulas for isogenies on alternate models of elliptic curvesCryptography on twisted Edwards curves over local fieldsIsogenies on twisted Hessian curvesО вычислении кратных точек на эллиптических кривых над конечными полями с использованием нескольких оснований систем счисления и новых видов координатSpeeding up Huff form of elliptic curvesHigh-performance Implementation of Elliptic Curve Cryptography Using Vector InstructionsElliptic curves and special values of Gaussian hypergeometric seriesECM on Graphics CardsFour-dimensional Gallant-Lambert-Vanstone scalar multiplicationEnergy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless Sensor NodesDeterministic Encoding into Twisted Edwards CurvesFaster cofactorization with ECM using mixed representationsJacobi Quartic Curves RevisitedEMBEDDING FINITE FIELDS INTO ELLIPTIC CURVESIsogeny-based key compression without pairingsEliptic curves in post-quantum cryptographySupersingular twisted Edwards curves over prime fields. I: Supersingular twisted Edwards curves with \(j\)-invariants equal to zero and \(12^3\)Scalar multiplication for twisted Edwards curves using the extended double-base number systemAnother Approach to Pairing Computation in Edwards CoordinatesA mean value formula for elliptic curvesDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applicationsBitcoin security with a twisted Edwards curve


Uses Software


Cites Work


This page was built for publication: Twisted Edwards Curves