搜索结果: 1-13 共查到“军队指挥学 Hyperelliptic curve”相关记录13条 . 查询时间(0.078 秒)
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation
2012/6/14
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation Ordinary Curves Pairing-Friendly Constructions Cocks-Pinch Method Brezing-Weng Method.
2012/3/22
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...
Genus 2 Hyperelliptic Curve Families with Explicit Jacobian Order Evaluation and Pairing-Friendly Constructions
public-key cryptography / Hyperelliptic Curves Genus 2 Order Computation Ordinary Curves Pairing-Friendly Constructions Cocks-Pinch Method Brezing-Weng Method.
2012/3/21
The use of (hyper)elliptic curves in cryptography relies on the ability to compute the Jacobian order of a given curve. Recently, Satoh proposed a probabilistic polynomial time algorithm to test wheth...
ACCELERATING THE SCALAR MULTIPLICATION ON GENUS 2 HYPERELLIPTIC CURVE CRYPTOSYSTEMS
public-key cryptography / hyperelliptic curve cryptosystem public-key cryptography discrete logarithm problem
2012/3/21
Elliptic Curve Cryptography (ECC) was independently introduced by Koblitz and Miller in the eighties. ECC requires shorter sizes of underlying finite fields in com- parison to other public key cryptos...
Fast Endomorphism for any Genus 2 Hyperelliptic Curve over a Finite Field of Even Characteristic
Hyperelliptic cryptosystem Jacobian efficiently computable endomorphism
2010/11/26
In EUROCRYPT 2009, Galbraith, Lin and Scott constructed an efficiently computable endomorphism for a large family of elliptic curves defined over finite fields of large characteristic. They demonstrat...
Software Implementation of Genus-2 Hyperelliptic Curve Cryptosystems Over Prime Fields
Hyperelliptic curve divisor addition efficient implementation
2009/6/2
This paper describes the system parameters and software implementation of a HECDSA cryptosystem based on genus-2 hyperelliptic curves over prime fields. We show how to reduce the computational complex...
Efficient Implementation of Genus Three Hyperelliptic Curve Cryptography over F2n
hyperelliptic curve arithmetic scalar multiplication Harley algorithm
2009/4/10
The optimization of the Harley algorithm is an active area
of hyperelliptic curve cryptography. We propose an efficient method for
software implementation of genus three Harley algorithm over F2n. O...
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two
High Performance Arithmetic Hyperelliptic Curve Cryptosystems Genus Two
2009/4/10
High Performance Arithmetic for Hyperelliptic Curve Cryptosystems of Genus Two.
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors
hyperelliptic curve cryptosystem scalar multiplication timing attack
2009/4/10
It has recently been reported that the performance of hyperelliptic curve
cryptosystems (HECC) is competitive to that of elliptic curve cryptosystems (ECC).
However, it is expected that HECC still c...
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
hyperelliptic curves explicit formulae comparison HECC vs. ECC
2009/4/8
For most of the time since they were proposed, it was widely believed that hyperelliptic curve
cryptosystems (HECC) carry a substantial performance penalty compared to elliptic curve cryptosystems (E...
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two
hyperelliptic curve cryptosystems scalar multiplication divisor class halving
2009/3/31
We deal with a divisor class halving algorithm on hyperelliptic
curve cryptosystems (HECC), which can be used for scalar multiplication,
instead of a doubling algorithm. It is not obvious how to con...
Finding Optimum Parallel Coprocessor Design for Genus 2 Hyperelliptic Curve Cryptosystems
hyperelliptic curve hardware architecture coprocessor
2009/3/20
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithmetic-intensive publickey
primitives, e.g. in high-end smart cards. One of these emerging and very p...
Decomposed Attack for the Jacobian of a Hyperelliptic Curve over an Extension Field
Decomposed Attack Hyperelliptic curve Discrete logarithm problem
2008/9/8
We study the solution of the discrete logarithm problem for
the Jacobian of a curve of genus g defined over an extension field Fqn, by
decomposed attack, considering a external elements B0 given by ...