Sciweavers

53 search results - page 4 / 11
» How to Hash into Elliptic Curves
Sort
View
EUROCRYPT
1999
Springer
14 years 25 days ago
On the Performance of Hyperelliptic Cryptosystems
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group law on such curves and how to genera...
Nigel P. Smart
DCC
2003
IEEE
14 years 8 months ago
The Insecurity of the Elliptic Curve Digital Signature Algorithm with Partially Known Nonces
Nguyen and Shparlinski recently presented a polynomial-time algorithm that provably recovers the signer's secret DSA key when a few bits of the random nonces k (used at each s...
Phong Q. Nguyen, Igor Shparlinski
ANTS
2010
Springer
246views Algorithms» more  ANTS 2010»
14 years 14 days ago
Visualizing Elements of Sha[3] in Genus 2 Jacobians
Abstract. Mazur proved that any element ξ of order three in the Shafarevich-Tate group of an elliptic curve E over a number field k can be made visible in an abelian surface A in...
Nils Bruin, Sander R. Dahmen
CARDIS
2000
Springer
124views Hardware» more  CARDIS 2000»
14 years 27 days ago
Elliptic Curve Cryptography on Smart Cards without Coprocessors
Abstract This contribution describes how an elliptic curve cryptosystem can be implemented on very low cost microprocessors with reasonable performance. We focus in this paper on t...
Adam D. Woodbury, Daniel V. Bailey, Christof Paar
AFRICACRYPT
2008
Springer
14 years 2 months ago
Twisted Edwards Curves
Abstract. This paper introduces “twisted Edwards curves,” a generalization of the recently introduced Edwards curves; shows that twisted Edwards curves include more curves over...
Daniel J. Bernstein, Peter Birkner, Marc Joye, Tan...