Sciweavers

9 search results - page 1 / 2
» Two Topics in Hyperelliptic Cryptography
Sort
View
SACRYPT
2001
Springer
14 years 2 months ago
Two Topics in Hyperelliptic Cryptography
Florian Hess, Gadiel Seroussi, Nigel P. Smart
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
14 years 4 months ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
14 years 3 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
13 years 9 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson