Hyper-and-elliptic-curve cryptography

被引:8
|
作者
Bernstein, Daniel J. [1 ,2 ]
Lange, Tanja [2 ]
机构
[1] Univ Illinois, Chicago, IL 60607 USA
[2] Tech Univ Eindhoven, NL-5600 MB Eindhoven, Netherlands
基金
美国国家科学基金会;
关键词
FACTORIZATION;
D O I
10.1112/S1461157014000394
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper introduces hyper-and-elliptic-curve cryptography, in which a single high-security group supports fast genus-2-hyperelliptic-curve formulas for variable-base-point single-scalar multiplication (for example, DiffieHellman shared-secret computation) and at the same time supports fast elliptic-curve formulas for fixed-base-point scalar multiplication (for example, key generation) and multi-scalar multiplication (for example, signature verification).
引用
收藏
页码:181 / 202
页数:22
相关论文
共 50 条
  • [21] Elliptic curve cryptography on constraint environments
    de Santos, MD
    Sanchez-Avila, C
    Sanchez-Reillo, R
    38TH ANNUAL 2004 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2004, : 212 - 220
  • [22] Elliptic Curve Cryptography: A Dynamic Paradigm
    Som, Subhranil
    Majumder, Rana
    Dutta, Sandip
    2017 INTERNATIONAL CONFERENCE ON INFOCOM TECHNOLOGIES AND UNMANNED SYSTEMS (TRENDS AND FUTURE DIRECTIONS) (ICTUS), 2017, : 427 - 431
  • [23] Compiler assisted elliptic curve cryptography
    Barbosa, M.
    Moss, A.
    Page, D.
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS 2007: COOPIS, DOA, ODBASE, GADA, AND IS, PT 2, PROCEEDINGS, 2007, 4804 : 1785 - +
  • [24] An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography
    Ch, Shehzad Ashraf
    Uddin, Nizam
    Sher, Muhammad
    Ghani, Anwar
    Naqvi, Husnain
    Irshad, Azeem
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (05) : 1711 - 1723
  • [25] A hybrid scheme using hyper-chaotic system and elliptic curve cryptography for image encryption
    Chaouch I.
    Naanaa A.
    ElAsmi S.
    Multimedia Tools and Applications, 2025, 84 (9) : 6545 - 6569
  • [26] Hyper Elliptic Curve Cryptography In Multi Cloud-Security Using DNA (Genetic) Techniques
    Selvi, S.
    Gobi, M.
    Kanchana, M.
    Mary, S. Femina
    2017 INTERNATIONAL CONFERENCE ON COMPUTING METHODOLOGIES AND COMMUNICATION (ICCMC), 2017, : 934 - 939
  • [27] A software library for elliptic curve cryptography
    Konstantinou, E
    Stamatiou, Y
    Zaroliagis, C
    ALGORITHMS-ESA 2002, PROCEEDINGS, 2002, 2461 : 625 - 636
  • [28] A reconfiguration hierarchy for elliptic curve cryptography
    Schaumont, P
    Verbauwhede, I
    CONFERENCE RECORD OF THE THIRTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1 AND 2, 2001, : 449 - 453
  • [29] Optimal Implementation of Elliptic Curve Cryptography
    Lv, Hongqiang
    Li, Hui
    Yi, Junkai
    Lu, Hao
    2013 IEEE INTERNATIONAL CONFERENCE ON SERVICE OPERATIONS AND LOGISTICS, AND INFORMATICS (SOLI), 2013, : 35 - 39
  • [30] Elliptic curve cryptography on smart cards
    de-Miguel-de-Santos, M
    Sanchez-Avila, C
    Sanchez-Reillo, R
    8TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL V, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2004, : 162 - 167