Hyper-and-elliptic-curve cryptography

被引:8
|
作者
Bernstein, Daniel J. [1 ,2 ]
Lange, Tanja [2 ]
机构
[1] Univ Illinois, Chicago, IL 60607 USA
[2] Tech Univ Eindhoven, NL-5600 MB Eindhoven, Netherlands
来源
LMS JOURNAL OF COMPUTATION AND MATHEMATICS | 2014年 / 17卷
基金
美国国家科学基金会;
关键词
FACTORIZATION;
D O I
10.1112/S1461157014000394
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
This paper introduces hyper-and-elliptic-curve cryptography, in which a single high-security group supports fast genus-2-hyperelliptic-curve formulas for variable-base-point single-scalar multiplication (for example, DiffieHellman shared-secret computation) and at the same time supports fast elliptic-curve formulas for fixed-base-point scalar multiplication (for example, key generation) and multi-scalar multiplication (for example, signature verification).
引用
收藏
页码:181 / 202
页数:22
相关论文
共 50 条
  • [31] Low power elliptic curve cryptography
    Keller, Maurice
    Marnane, William
    INTEGRATED CIRCUIT AND SYSTEM DESIGN: POWER AND TIMING MODELING, OPTIMIZATION AND SIMULATION, 2007, 4644 : 310 - +
  • [33] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [34] A Critical Review on Elliptic Curve Cryptography
    Singh, Soram Ranbir
    Khan, Ajoy Kumar
    Singh, Takhellambam Sonamani
    2016 INTERNATIONAL CONFERENCE ON AUTOMATIC CONTROL AND DYNAMIC OPTIMIZATION TECHNIQUES (ICACDOT), 2016, : 13 - 18
  • [35] On Elliptic Curve Cryptography implementations and evaluation
    Alimi, Nejmeddine
    Lahbib, Younes
    Machhout, Mohsen
    Tourki, Rached
    2016 2ND INTERNATIONAL CONFERENCE ON ADVANCED TECHNOLOGIES FOR SIGNAL AND IMAGE PROCESSING (ATSIP), 2016, : 35 - 40
  • [36] Elliptic Curve Cryptography for Ciphering Images
    Gupta, Nikita
    Kundu, Vikas
    Kurra, Neha
    Sharma, Shivani
    Pal, Bhagyashree
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, SIGNALS, COMMUNICATION AND OPTIMIZATION (EESCO), 2015,
  • [37] An Enhanced Elliptic Curve Cryptography for Biometric
    Althobaiti, Ohood S.
    Aboalsamh, Hatim A.
    2012 7TH INTERNATIONAL CONFERENCE ON COMPUTING AND CONVERGENCE TECHNOLOGY (ICCCT2012), 2012, : 1048 - 1055
  • [38] A VHDL generator for elliptic curve cryptography
    Järvinen, K
    Tommiska, M
    Skyttä, J
    FIELD-PROGRAMMABLE LOGIC AND APPLICATIONS, PROCEEDINGS, 2004, 3203 : 1098 - 1100
  • [39] Steganographic manipulations with elliptic curve cryptography
    Shankar, T. N.
    Sahoo, G.
    Niranjan, S.
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2012, 4 (04) : 280 - 297
  • [40] Hardware Accelerators for Elliptic Curve Cryptography
    Puttmann, C.
    Shokrollahi, J.
    Porrmann, M.
    Rueckert, U.
    ADVANCES IN RADIO SCIENCE, 2008, 6 : 259 - 264