The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case of elliptic curves, which is now well advanced. Most of the algorithms known for elliptic curves and their applications to cryptography can be more or less easily extended to Jacobians of hyperelliptic curves. In a first part, we investigate some aspects of Igusa's invariants which generalize the j-invariant of elliptic curves. For (2,2)-reducible Jacobians, we relate by explicit formulae the Igusa's invariants to the j-invariants of the quotient elliptic curves. Besides, we study these invariants by the way of Siegel modular forms with a view toward computing modular equations. The second part is dedicated to algorithms for computing the card...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
International audienceIn this paper we look in detail at the curves which arise in the method of Gal...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
Abstract. The Diffie-Hellman problem as a cryptographic primitive plays an important role in modern ...
Nowadays, one area of research in cryptanalysis is solving the Discrete Logarithm Problem (DLP) in f...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
International audienceIn this paper we look in detail at the curves which arise in the method of Gal...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
International audienceIn this paper we look in detail at the curves which arise in the method of Gal...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Cryptosystems based on hyperelliptic curves were first presented by N. Koblitz, in 1989 (c.f. [11])....
Abstract. The Diffie-Hellman problem as a cryptographic primitive plays an important role in modern ...
Nowadays, one area of research in cryptanalysis is solving the Discrete Logarithm Problem (DLP) in f...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
The discrete logarithm problem is a fundamental brick for several protocols for secured communicatio...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
International audienceIn this paper we look in detail at the curves which arise in the method of Gal...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
International audienceIn this paper we look in detail at the curves which arise in the method of Gal...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...