In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a public-key cryptosystem is the computation of scalar multiples in a cyclic group. Chapter 9 showed how the computation of scalar multiples can be reduced to a sequence of additions and doublings in the group. Hence, for an efficient system we need to have groups with efficient group laws. In Chapter 13 we detailed the arithmetic on elliptic curves. This chapter deals with hyperelliptic curves, which can be seen as a generalization of elliptic curves. We first give a brief overview of the main properties of hyperelliptic curves repeating the definitions for the convenience of the reader. The details can be found in Chapter 4 . In the application...
We derive an explicit method of computing the composition step in Cantor’s algorithm for group opera...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
Elliptic curves constitute one of the main topics of this book. They have been proposed for applicat...
We derive an explicit method of computing the composition step in Cantor’s algorithm for group opera...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
In Chapter 1 we introduced the discrete logarithm problem and showed that the main operation in a pu...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
The ideal class group of hyperelliptic curves can be used in cryptosystems based on the discrete log...
International audienceThe discrete logarithm problem based on elliptic and hyperelliptic curves has ...
Elliptic curves constitute one of the main topics of this book. They have been proposed for applicat...
We derive an explicit method of computing the composition step in Cantor’s algorithm for group opera...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...
At its core, cryptography relies on problems that are simple to construct but difficult to solve unl...