International audienceWe construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant--Lambert--Vanstone (GLV) and Galbraith--Lin--Scott (GLS) endomorphisms. Our construction is based on reducing \(\QQ\)-curves---curves over quadratic number fields without complex multiplication, but with isogenies to their Galois conjugates---modulo inert primes. As a first application of the general theory we construct, for every \(p > 3\), two one-parameter families of elliptic curves over \(\FF_{p^2}\) equipped with endomorphisms that are faster than doubling. Like GLS (which appears as a degenerate case of our constru...
Abstract. The fundamental operation in elliptic curve cryptographic schemes is the multiplication of...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...
International audienceWe construct new families of elliptic curves over \(\FF_{p^2}\) with efficient...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
Abstract. We give a detailed account of the use of Q-curve reductions to construct elliptic curves o...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of)...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Since 2000 pairings became a very useful tool to design new protocols in cryptography. Short signatu...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
International audienceThe first step in elliptic curve scalar multiplication algorithms based on sca...
This article explores the use of elliptic curves with order 2r = 2 mod 4, which we call double-odd e...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
Abstract. The fundamental operation in elliptic curve cryptographic schemes is the multiplication of...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...
International audienceWe construct new families of elliptic curves over \(\FF_{p^2}\) with efficient...
International audienceWe give a detailed account of the use of $\mathbb{Q}$-curve reductions to cons...
Abstract. We give a detailed account of the use of Q-curve reductions to construct elliptic curves o...
In this article we present how we can use fast F_{p²} multiplication to speed-up arithmetic on ellip...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of)...
The most significant pairing-based cryptographic protocol to be proposed so far is undoubtedly the ...
Since 2000 pairings became a very useful tool to design new protocols in cryptography. Short signatu...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
International audienceThe first step in elliptic curve scalar multiplication algorithms based on sca...
This article explores the use of elliptic curves with order 2r = 2 mod 4, which we call double-odd e...
Abstract. Efficiently computable homomorphisms allow elliptic curve point multiplication to be accel...
Abstract. The fundamental operation in elliptic curve cryptographic schemes is the multiplication of...
International audienceWe describe an implementation of fast elliptic curve scalar multiplication, op...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...