Abstract. We show that supersingular abelian varieties can be used to obtain higher MOV security per bit, in all characteristics, than supersingular elliptic curves. We give a point compression/decompression algorithm for primitive subgroups associated with elliptic curves, that gives shorter signatures, cipher-texts, or keys for the same security while using the arithmetic on supersingular elliptic curves. We determine precisely which embedding degrees are possible for simple supersingular abelian varieties over finite fields, and define some invariants that are better measures of cryptographic security than the embed-ding degree. We construct examples of good supersingular abelian varieties to use in pairing-based cryptography. 1
The security and performance of pairing based cryptography has provoked a large volume of research, ...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and T...
Abstract. For certain security applications, including identity based encryption and short signature...
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element o...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
In number theoretic cryptography there is always the problem of scaling-up security to a higher leve...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Thesis (Ph.D.)--University of Washington, 2018An elliptic curve $E$ over a finite field $\FF_q$ is c...
We study cryptosystems based on supersingular isogenies. This is an active area of research in post-...
Finding suitable non-supersingular elliptic curves for pairing-based cryptosystems becomes an import...
The Tate pairing has plenty of attractive applications, e.g., ID-based cryptosystems, short signatur...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
Abstract. The Weil and Tate pairings are defined for elliptic curves over fields, including finite f...
A Trace Zero Variety is a specific subgroup of the group of the divisor classes on a hyperelliptic c...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and T...
Abstract. For certain security applications, including identity based encryption and short signature...
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element o...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
In number theoretic cryptography there is always the problem of scaling-up security to a higher leve...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Thesis (Ph.D.)--University of Washington, 2018An elliptic curve $E$ over a finite field $\FF_q$ is c...
We study cryptosystems based on supersingular isogenies. This is an active area of research in post-...
Finding suitable non-supersingular elliptic curves for pairing-based cryptosystems becomes an import...
The Tate pairing has plenty of attractive applications, e.g., ID-based cryptosystems, short signatur...
Abstract. The security and performance of pairing based cryptography has provoked a large volume of ...
Abstract. The Weil and Tate pairings are defined for elliptic curves over fields, including finite f...
A Trace Zero Variety is a specific subgroup of the group of the divisor classes on a hyperelliptic c...
The security and performance of pairing based cryptography has provoked a large volume of research, ...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
We focus on the implementation and security aspects of cryptographic protocols that use Type 1 and T...