International audienceIn this paper we explain how to construct F_q-complete addition laws on the Jacobian of an hyperelliptic curve of genus 2. This is usefull for robustness and is needed for some applications (like for instance on embedded devices)
This paper presents an algorithm to construct cryptographically strong genus 2 curves and their Kumm...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...
International audienceIn this paper we explain how to construct F_q-complete addition laws on the Ja...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
descriptionInternational audienceIn 1986, D. V. Chudnovsky and G. V. Chudnovsky proposed to use form...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
International audienceA Kummer variety is the quotient of an abelian variety by the automorphism $(-...
We summarise recent advances in techniques for solving Diophantine problems on hyperelliptic curves;...
Dans cette thèse, j'étudie deux aspects distincts de la cryptographie basée sur les courbes ellip...
Le logarithme discret sur les courbes elliptiques fournit la panoplie standard de la cryptographie à...
We derive an explicit method of computing the composition step in Cantor’s algorithm for group opera...
This paper presents an algorithm to construct cryptographically strong genus 2 curves and their Kumm...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...
International audienceIn this paper we explain how to construct F_q-complete addition laws on the Ja...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
descriptionInternational audienceIn 1986, D. V. Chudnovsky and G. V. Chudnovsky proposed to use form...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
International audienceA Kummer variety is the quotient of an abelian variety by the automorphism $(-...
We summarise recent advances in techniques for solving Diophantine problems on hyperelliptic curves;...
Dans cette thèse, j'étudie deux aspects distincts de la cryptographie basée sur les courbes ellip...
Le logarithme discret sur les courbes elliptiques fournit la panoplie standard de la cryptographie à...
We derive an explicit method of computing the composition step in Cantor’s algorithm for group opera...
This paper presents an algorithm to construct cryptographically strong genus 2 curves and their Kumm...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...
Algebraic curves are central objects in algebraic geometry. In this thesis, we consider these object...