Hyperelliptic curve cryptography

Results: 62



#Item
11Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Abelian varieties, theta functions and cryptography Part 2 Damien Robert1 1

Add to Reading List

Source URL: www.normalesup.org

Language: English - Date: 2013-11-15 16:58:00
12Isogenies and the Discrete Logarithm Problem in Genus Three Benjamin Smith Royal Holloway, University of London  September 6, 2007

Isogenies and the Discrete Logarithm Problem in Genus Three Benjamin Smith Royal Holloway, University of London September 6, 2007

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-08 07:01:53
13Elliptic and hyperelliptic curves with weak coverings, ECC2007  Elliptic and hyperelliptic curves with weak coverings against Weil descent attack Jinhui Chao Joint work with Fumiyuki Momose

Elliptic and hyperelliptic curves with weak coverings, ECC2007 Elliptic and hyperelliptic curves with weak coverings against Weil descent attack Jinhui Chao Joint work with Fumiyuki Momose

Add to Reading List

Source URL: mathsci.ucd.ie

Language: English - Date: 2007-09-14 09:56:18
14Useful Stuff Benjamin Smith Context Algebraic Curves  Useful Stuff

Useful Stuff Benjamin Smith Context Algebraic Curves Useful Stuff

Add to Reading List

Source URL: ecc2011.loria.fr

Language: English - Date: 2011-09-30 12:40:05
15A Faster way to do ECC Mike Scott Dublin City University Joint work with Steven Galbraith Royal Holloway, University of London

A Faster way to do ECC Mike Scott Dublin City University Joint work with Steven Galbraith Royal Holloway, University of London

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
16Binary Edwards Curves Reza Rezaeian Farashahi Dept. of Mathematics and Computing Science TU Eindhoven joint work with: and

Binary Edwards Curves Reza Rezaeian Farashahi Dept. of Mathematics and Computing Science TU Eindhoven joint work with: and

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-03 15:27:31
17Bilinear Pairings in Cryptography Master thesis #603 by

Bilinear Pairings in Cryptography Master thesis #603 by

Add to Reading List

Source URL: www.math.ru.nl

Language: English - Date: 2009-07-13 10:25:27
18ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

ECCEfficient and Generalized Pairing Computation on Abelian Varieties Hyang-Sook Lee Ewha Womans University

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-10-03 22:36:38
19Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research  ECC 2008, Utrecht, Sep

Elliptic Curve Hash (and Sign) ECOH (and the 1-up problem for ECDSA) Daniel R. L. Brown Certicom Research ECC 2008, Utrecht, Sep

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29
20Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology  The 12th Workshop on Elliptic Curve Cryptography

Edwards Curves and the ECM Factorisation Method Peter Birkner Eindhoven University of Technology The 12th Workshop on Elliptic Curve Cryptography

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2008-09-27 14:59:29