The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one should take care about their vulnerability against the Zero-Value Point Attacks (ZVP). In this paper, we present a new procedure to find elliptic curves which are resistant against these attacks. This algorithm finds, in an efficient way, a secure curve by means of volcanoes of isogenies. Moreover, we can deal with one more security condition than Akishita-Takagi method with our search. © 2009 Springer Berlin Heidelberg.
CITATION STYLE
Miret, J., Sadornil, D., Tena, J., Tomàs, R., & Valls, M. (2009). On avoiding ZVP-attacks using isogeny volcanoes. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5379 LNCS, pp. 266–277). https://doi.org/10.1007/978-3-642-00306-6_20
Mendeley helps you to discover research relevant for your work.