Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Cryptographic aspects of real hyperelliptic curves

View through CrossRef
Abstract In this paper, we give an overview of cryptographic applications using real hyperelliptic curves. We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols. We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in genus 2, and advances in solving the infrastructure discrete logarithm problem, whose presumed intractability is the basis of security for the related cryptographic protocols.
Title: Cryptographic aspects of real hyperelliptic curves
Description:
Abstract In this paper, we give an overview of cryptographic applications using real hyperelliptic curves.
We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols.
We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in genus 2, and advances in solving the infrastructure discrete logarithm problem, whose presumed intractability is the basis of security for the related cryptographic protocols.

Related Results

Arithmetic properties of non-hyperelliptic genus 3 curves
Arithmetic properties of non-hyperelliptic genus 3 curves
This thesis explores the explicit computation of twists of curves. We develope an algorithm for computing the twists of a given curve assuming that its automorphism group is known....
A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Next-Generation Cryptographic Security in Multi-Cloud Enterprises: AI-Enhanced Data Privacy, Protection, and Threat-Resilient Automation
Next-Generation Cryptographic Security in Multi-Cloud Enterprises: AI-Enhanced Data Privacy, Protection, and Threat-Resilient Automation
Enterprise architectures with multiple clouds have brought unprecedented complexity to cryptographic security management, demanding out-of-the-box solutions that go beyond the old ...
Type Curves For McKinley Analysis Of Drill-Stem Test Data
Type Curves For McKinley Analysis Of Drill-Stem Test Data
Abstract McKinley-type curves that include the effects of short production times (i.e., less than 120 minutes) have been developed for pressure buildup test analy...
Orthogonal Curve Analysis of Human Scalp Shape
Orthogonal Curve Analysis of Human Scalp Shape
This paper presents a shape analysis on orthogonal feature curves of 3D bald head scans with the intention of predicting scalp shape under the hair. While there are currently a num...
General regularities of height-diameter curves in Hungarian oak, sessile oak and Turkey oak high forests
General regularities of height-diameter curves in Hungarian oak, sessile oak and Turkey oak high forests
The height-diameter curves of natural even-aged Hungarian oak, sessile oak and Turkey oak forests in the regions of Staro Oryahovo, Sherba, Tsonevo and Aytos Forestry Districts hav...
The tropical Abel–Prym map
The tropical Abel–Prym map
We prove that, under mild assumptions, the tropical Abel–Prym map Ψ : ...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...

Back to Top