Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem
Abstract
References
Index Terms
- Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem
Recommendations
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
ACSW '07: Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper ...
Four-Dimensional GLV via the Weil Restriction
Part I of the Proceedings of the 19th International Conference on Advances in Cryptology - ASIACRYPT 2013 - Volume 8269The Gallant-Lambert-Vanstone GLV algorithm uses efficiently computable endomorphisms to accelerate the computation of scalar multiplication of points on an abelian variety. Freeman and Satoh proposed for cryptographic use two families of genus 2 curves ...
Twisted Edwards curves
AFRICACRYPT'08: Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptologyThis paper introduces "twisted Edwards curves," a generalization of the recently introduced Edwards curves; shows that twisted Edwards curves include more curves over finite fields, and in particular every elliptic curve in Montgomery form; shows how to ...
Comments
Information & Contributors
Information
Published In
![cover image ACM Conferences](/cms/asset/9a6f45d1-1ab2-4e18-8fb3-c6f1e8c63613/3384940.cover.jpg)
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 102Total Downloads
- Downloads (Last 12 months)9
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in