The RSA cryptosystem introduced in 1977 by Ron Rivest, Adi Shamir and Len Adleman is the most commonly deployed public-key cryptosystem. Elliptic curve cryptography (ECC) introduced in the mid 80's by Neal Koblitz and Victor Miller is becoming an increasingly popular alternative to RSA offering competitive performance due the use of smaller key sizes. Most recently hyperelliptic curve cryptography (HECC) has been demonstrated to have comparable and in some cases better performance than ECC. The security of RSA relies on the integer factorization problem whereas the security of (H)ECC is based on the (hyper)elliptic curve discrete logarithm problem ((H)ECDLP). In this thesis the practical performance of the best methods to solve these proble...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
International audiencePublic key cryptography is required in many applications such as key exchange,...
Elliptic Curve Cryptography (ECC) represents a different way to do public-key cryptography and it of...
Elliptic Curve Cryptography (ECC) is a popular tool to construct public-key crypto-systems. The secu...
Motivated by the advantages of using elliptic curves for discrete logarithm-based public-key cryptog...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The securit...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public ...
Public-key cryptography is a fundamental component of modern electronic communication that can be co...
National audienceWe present our first results on the extension of computation accelerators designed ...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
A major cryptanalytic computation is currently underway on multiple platforms, including standard CP...
ii Security issues play an important role in almost all modern communication and com-puter networks....
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
International audiencePublic key cryptography is required in many applications such as key exchange,...
Elliptic Curve Cryptography (ECC) represents a different way to do public-key cryptography and it of...
Elliptic Curve Cryptography (ECC) is a popular tool to construct public-key crypto-systems. The secu...
Motivated by the advantages of using elliptic curves for discrete logarithm-based public-key cryptog...
Elliptic curves have become widespread in cryptographic applications since they offer the same crypt...
Elliptic curve cryptography (ECC) has become a popular public key cryptography standard. The securit...
The Elliptic Curve Method (ECM) is the method of choice for nding medium-size prime factors. A good...
Elliptic Curve Cryptosystems (ECC) have been proposed as an alternative to other established public ...
Public-key cryptography is a fundamental component of modern electronic communication that can be co...
National audienceWe present our first results on the extension of computation accelerators designed ...
Since their invention in the mid 1980s, Elliptic Curve Cryptosystems (ECC) have become an alternativ...
A major cryptanalytic computation is currently underway on multiple platforms, including standard CP...
ii Security issues play an important role in almost all modern communication and com-puter networks....
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
The elliptic curve cryptography can be observed as two levels of computations, upper scalar multipli...
International audiencePublic key cryptography is required in many applications such as key exchange,...
Elliptic Curve Cryptography (ECC) represents a different way to do public-key cryptography and it of...