Abstract. Algebraic curves over finite fields are being extensively used in the design of public-key cryptographic schemes. This paper surveys some topics in algebraic curve cryptography, with an emphasis on recent developments in algorithms for the elliptic and hyperelliptic curve discrete logarithm problems, and computational problems in pairing-based cryptography. 1
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper, we give an overview of cryptographic applications using real hyperelliptic ...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
List of Tables. List of Figures. Foreword. Preface. 1. Public Key Cryptography. 2. The Group Law on...
Elliptic curves have a rich algebraic structure which can, in fact, be used in applications to crypt...
Nowadays, elliptic curve cryptosystems(ECC) receive attention and much efforts are being dedicated t...
6 pages.-- Communication presented at the 5th World Multiconference on Systemics, Cybernetics and In...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper, we give an overview of cryptographic applications using real hyperelliptic ...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
Preserving a strong connection between mathematics and information security, elliptic and hyperellip...
The reach of algebraic curves in cryptography goes far beyond elliptic curve or public key cryptogra...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
List of Tables. List of Figures. Foreword. Preface. 1. Public Key Cryptography. 2. The Group Law on...
Elliptic curves have a rich algebraic structure which can, in fact, be used in applications to crypt...
Nowadays, elliptic curve cryptosystems(ECC) receive attention and much efforts are being dedicated t...
6 pages.-- Communication presented at the 5th World Multiconference on Systemics, Cybernetics and In...
The security of many public-key cryptosystems relies on the existence of groups in which the discret...
Abstract. In this paper, we give an overview of cryptographic applications using real hyperelliptic ...
Abstract. Motivated by the advantages of using elliptic curves for discrete logarithm-based public-k...