Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Elliptic curves were introduced to the ancient science of cryptography in the mid 1980s, and Elliptic Curve Cryptography (ECC) has since been growing rapidly. However, owing to the incompleteness of the Weierstrass addition law, elliptic... more
    • by 
    •   3  
      Elliptic curvesElliptic Curve CryptographyIsogenies
    • by 
    • Isogenies
In 2005, Jao, Miller, and Venkatesan proved that the DLP of elliptic curves with the same endomorhism ring is random reducible under the GRH. In this talk, we discuss a possible generalization of this result to hyperelliptic curves of... more
    • by 
    •   3  
      CryptographyIsogeniesDiscrete Logarithm
Abstract. The Gallant-Lambert-Vanstone (GLV) algorithm uses efficiently computable endomorphisms to accelerate the computation of scalar multiplication of points on an abelian variety. Freeman and Satoh proposed for cryptographic use two... more
    • by 
    •   2  
      Elliptic curvesIsogenies
    • by 
    •   8  
      Pure MathematicsElliptic curvesCryptologyLarge classes