搜索结果: 1-13 共查到“密码学 Kummer”相关记录13条 . 查询时间(0.103 秒)
A new elliptic curve point compression method based on Fp-rationality of some generalized Kummer surfaces
elliptic cryptography point compression Barreto-Naehrig curves
2019/9/19
In the article we propose a new compression method (to 2log2(p)+32log2(p)+3 bits) for the Fp2Fp2-points of an elliptic curve Eb:y2=x3+bEb:y2=x3+b (for b∈F∗p2b∈Fp2∗) of jj-invariant ...
On Kummer Lines With Full Rational 2-torsion and Their Usage in Cryptography
Montgomery curves Edwards curves Kummer lines
2018/11/16
A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines in genus one, by observing that its SIMD-friendly arithmetic is competitive with the status quo. A more rece...
Computing supersingular isogenies on Kummer surfaces
Supersingular isogenies SIDH Kummer surface
2018/11/15
We apply Scholten's construction to give explicit isogenies between the Weil restriction of supersingular Montgomery curves with full rational 2-torsion over GF(p2)GF(p2) and corresponding abelian sur...
Simple oblivious transfer protocols compatible with Kummer and supersingular isogenies
Oblivious transfer Diffie-Hellman key exchange supersingular isogeny
2018/8/2
The key exchange protocol of Diffie and Hellman, which can be defined for any group, has the special feature of using only exponentiations. In particular, it can also be instantiated in Kummer varieti...
Scalar multiplication on Legendre form elliptic curves can be speeded up in two ways. One can perform the bulk of the computation either on the associated Kummer line or on an appropriate twisted Edwa...
Architecture level Optimizations for Kummer based HECC on FPGAs
hyper-elliptic curve cryptography hardware implementation architecture exploration
2017/10/16
On the basis of a software implementation of Kummer based HECC over Fp presented in 2016, we propose new hardware architectures. Our main objectives are: definition of architecture parameters (type, s...
Fast FPGA Implementations of Diffie-Hellman on the Kummer Surface of a Genus-2 Curve
Diffie-Hellman key exchange hyperelliptic curve cryptography Kummer surface
2017/9/1
We present the first hardware implementations of Diffie-Hellman key exchange based on the Kummer surface of Gaudry and Schost's genus-22 curve targeting a 128128-bit security level. We describe a sing...
This work considers the problem of fast and secure scalar multiplication using curves of genus one defined over a field of prime order. Previous work by Gaudry and Lubicz had suggested the use of the ...
μKummer: efficient hyperelliptic signatures and key exchange on microcontrollers
Hyperelliptic curve cryptography Kummer surface AVR ATmega
2016/4/13
We describe the design and implementation of efficient signature and key-exchange schemes for the AVR~ATmega and ARM Cortex~M0 microcontrollers, targeting the 128-bit security level. Our algorithms ar...
This paper sets new speed records for high-security constanttime
variable-base-point Diffie–Hellman software: 305395 Cortex-A8-slow
cycles; 273349 Cortex-A8-fast cycles; 88916 Sandy Bridge cycles; 8...
A Kummer variety is obtained as the quotient of an abelian variety by the automorphism
(−1) acting on it. Kummer varieties can be seen as a higher dimensional generalisation of the xcoordinate
...
Factor Base Discrete Logarithms in Kummer Extensions
Discrete logarithm Finite fields Kummer extension
2015/12/23
The discrete logarithm over finite fields of small characteristic can be solved much more efficiently than previously thought. This algorithmic breakthrough is based on heuristic polynomial time algor...
The arithmetic of characteristic 2 Kummer surfaces
arithmetic characteristic 2 Kummer surfaces
2009/6/3
The purpose of this paper is a description of a model of Kummer
surfaces in characteristic 2, together with the associated formulas
for the pseudo-group law. Since the classical model has bad reduct...