This paper aims at introducing generalized Jacobians as a new candidate for discrete logarithm (DL) based cryptography. The motivation for this work came from the observation that several practical DL-based cryptosystems, such as ElGamal, the Elliptic and Hyperelliptic Curve Cryptosystems, XTR, LUC as well as CEILIDH can all naturally be reinterpreted in terms of generalized Jacobians. However, usual Jacobians and algebraic tori are thus far the only generalized Jacobians implicitly utilized in cryptography. In order to go one step further, we here study the simplest nontrivial generalized Jacobians of an elliptic curve. In this first of a series of articles, we obtain explicit formulae allowing to efficiently perform arithmetic operations ...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
AbstractNowadays, elliptic curve cryptosystems receive attention and much effort is being dedicated ...
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be in...
Nowadays, one area of research in cryptanalysis is solving the Discrete Logarithm Problem (DLP) in f...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Nowadays, elliptic curve cryptosystems(ECC) receive attention and much efforts are being dedicated t...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
AbstractNowadays, elliptic curve cryptosystems receive attention and much effort is being dedicated ...
Groups where the discrete logarithm problem (DLP) is believed to be intractable have proved to be in...
Nowadays, one area of research in cryptanalysis is solving the Discrete Logarithm Problem (DLP) in f...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The discrete logarithm on elliptic curves give the standard protocols in public key cryptography: as...
The discrete logarithm on elliptic curves gives the standard protocols in public key cryptography: a...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
The study of algorithmical aspects of hyperelliptic curves is the natural continuation of the case o...
Nowadays, elliptic curve cryptosystems(ECC) receive attention and much efforts are being dedicated t...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
This is an invited submission to the Journal of Cryptology. It forms an extended version of work tha...
AbstractNowadays, elliptic curve cryptosystems receive attention and much effort is being dedicated ...