Hyperelliptic curve cryptography

Results: 62



#Item
51The Arithmetic of Hyperelliptic Curves E. V. Flynn∗ , Mathematical Institute, University of Oxford Abstract We summarise recent advances in techniques for solving Diophantine problems on hyperelliptic curves; in partic

The Arithmetic of Hyperelliptic Curves E. V. Flynn∗ , Mathematical Institute, University of Oxford Abstract We summarise recent advances in techniques for solving Diophantine problems on hyperelliptic curves; in partic

Add to Reading List

Source URL: people.maths.ox.ac.uk

Language: English - Date: 2006-07-08 18:57:37
52EXHIBITING SHA[2] ON HYPERELLIPTIC JACOBIANS N. BRUIN AND E.V. FLYNN Abstract. We discuss approaches to computing in the Shafarevich-Tate group of Jacobians of higher genus curves, with an emphasis on the theory and prac

EXHIBITING SHA[2] ON HYPERELLIPTIC JACOBIANS N. BRUIN AND E.V. FLYNN Abstract. We discuss approaches to computing in the Shafarevich-Tate group of Jacobians of higher genus curves, with an emphasis on the theory and prac

Add to Reading List

Source URL: people.maths.ox.ac.uk

Language: English - Date: 2006-07-08 18:57:36
53The state-of-the-art in hyperelliptic curve cryptography Craig Costello  Workshop on Curves and Applications

The state-of-the-art in hyperelliptic curve cryptography Craig Costello Workshop on Curves and Applications

Add to Reading List

Source URL: www.mathtube.org

Language: English - Date: 2013-09-20 13:09:55
54References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

References [1] M. Agrawal, N. Kayal, and N. Saxena. PRIMES is in P. Ann. of Math. (2), 160(2):781–793, [removed]L. V. Ahlfors. Complex Analysis. McGraw-Hill Book Co., New York, third edition, 1978. An introduction to

Add to Reading List

Source URL: www.math.brown.edu

Language: English - Date: 2008-03-20 11:42:48
55Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed]  17 December 2008

Post-Quantum Cryptography Tanja Lange Technische Universiteit Eindhoven [removed] 17 December 2008

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2009-01-22 19:45:07
569th Central European Conference on Cryptography - Tˇ reb´ıˇ c’09

9th Central European Conference on Cryptography - Tˇ reb´ıˇ c’09

Add to Reading List

Source URL: conf.fme.vutbr.cz

Language: English - Date: 2009-05-12 03:20:24
57The 9th Central European Conference on Cryptography T ebí [removed]T HIRD & F INAL A NNOUNCEMENT Dear Colleague,

The 9th Central European Conference on Cryptography T ebí [removed]T HIRD & F INAL A NNOUNCEMENT Dear Colleague,

Add to Reading List

Source URL: conf.fme.vutbr.cz

Language: English - Date: 2009-05-12 03:22:48
58Security dangers of the NIST curves Daniel J. Bernstein, Tanja Lange

Security dangers of the NIST curves Daniel J. Bernstein, Tanja Lange

Add to Reading List

Source URL: www.hyperelliptic.org

Language: English - Date: 2013-06-08 20:02:29
59Fields Institute Communications Volume 00, 0000

Fields Institute Communications Volume 00, 0000

Add to Reading List

Source URL: www.math.uwaterloo.ca

Language: English - Date: 2008-09-04 06:42:36
60Constructive and Destructive Facets of Weil Descent on Elliptic Curves Nigel Smart, Florian Hess, Pierrick Gaudry

Constructive and Destructive Facets of Weil Descent on Elliptic Curves Nigel Smart, Florian Hess, Pierrick Gaudry

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2000-01-25 14:42:53