This article, a result of the research project Design of a cryptoprocessor based on hyperelliptic curves, presents a literature review focused on the theory of hyperelliptic curves and how the points of these curves can be used for group arithmetic on them. We describe the hyperelliptic curves over real numbers, present how a suitable abelian group for computations with hy-perelliptic curves is formed, and the associated group operation. Finally we describe hyperel-liptic curves genre 2 in characteristic 2 and the optimization of the corresponding arithmetic for such curves. The review is focused on finding the most efficient arithmetic for the imple-mentation of a HECC system in hardware, i.e. the one that presents the least amount of oper...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
ii Security issues play an important role in almost all modern communication and com-puter networks....
Security issues play an important role in almost all modern communication and computer networks. As ...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
National audienceWe present our first results on the extension of computation accelerators designed ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
Abstract. Counting rational points on Jacobian varieties of hyperelliptic curves over finite fields ...
Die Dissertation wurde am 06.05.2010 bei der Technischen Universität München eingereicht und durch d...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...
ii Security issues play an important role in almost all modern communication and com-puter networks....
Security issues play an important role in almost all modern communication and computer networks. As ...
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithm...
In this paper we describe a high performance, area-efficient implementation of Hyperelliptic Curve C...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
National audienceWe present our first results on the extension of computation accelerators designed ...
De nombreux systèmes numériques nécessitent des primitives de cryptographie asymétrique de plus en p...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
Abstract. Counting rational points on Jacobian varieties of hyperelliptic curves over finite fields ...
Die Dissertation wurde am 06.05.2010 bei der Technischen Universität München eingereicht und durch d...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties...
Many digital systems require primitives for asymmetric cryptography that are more and more efficient...
The performance analysis of Hyperelliptic Curve Cryptosystems (HECC) over prime fields (Fp) of genus...
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, i...