International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in Lenstra's ECM factorization algorithm. Since then, his curves and the algorithms associated with them have become foundational in the implementation of elliptic curve cryptosystems. This article surveys the theory and cryptographic applications of Montgomery curves over non-binary finite fields, including Montgomery's x-only arithmetic and Ladder algorithm, x-only Diffie–Hellman, y-coordinate recovery, and 2-dimensional and Euclidean differential addition chains such as Montgomery's PRAC algorithm
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
This book offers the beginning undergraduate student some of the vista of modern mathematics by deve...
This paper discusses representations for computation on non-supersingular elliptic curves over binar...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Abstract. From the viewpoint of x-coordinate-only arithmetic on ellip-tic curves, switching between ...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
International audienceUsing powerful tools on genus 2 curves like the Kummer variety, we generalize ...
Abstract. Algebraic curves over finite fields are being extensively used in the design of public-key...
This paper examines subfield curve extensions on a number of elliptic curves over finite fields in c...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
This book offers the beginning undergraduate student some of the vista of modern mathematics by deve...
This paper discusses representations for computation on non-supersingular elliptic curves over binar...
International audienceThree decades ago, Montgomery introduced a new elliptic curve model for use in...
Abstract. From the viewpoint of x-coordinate-only arithmetic on ellip-tic curves, switching between ...
The Montgomery ladder is a remarkably simple method of computing scalar multiples of points on a bro...
Hyperelliptic curves of low genus obtained a lot of attention in the recent past for cryptographic a...
In this survey paper we present a careful analysis of the Montgomery ladder procedure applied to the...
Part 2: Security EngineeringInternational audienceIn 2010, Joye et. al brought the so-called Huff cu...
More than 25 years ago, elliptic curves over finite fields were suggested as a group in which the Di...
This thesis deals with two topics: elliptic-curve cryptography and code-based cryptography. In 2007 ...
International audienceUsing powerful tools on genus 2 curves like the Kummer variety, we generalize ...
Abstract. Algebraic curves over finite fields are being extensively used in the design of public-key...
This paper examines subfield curve extensions on a number of elliptic curves over finite fields in c...
AbstractAlgebraic curves over finite fields are being extensively used in the design of public-key c...
This book offers the beginning undergraduate student some of the vista of modern mathematics by deve...
This paper discusses representations for computation on non-supersingular elliptic curves over binar...