Abstract
In this paper, we give an overview of cryptographic applications using real hyperelliptic curves. We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols. We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in genus 2, and advances in solving the infrastructure discrete logarithm problem, whose presumed intractability is the basis of security for the related cryptographic protocols. © 2010, Versita. All rights reserved.
Author supplied keywords
Cite
CITATION STYLE
Jacobson, M. J., Scheidler, R., & Stein, A. (2010). Cryptographic aspects of real hyperelliptic curves. Tatra Mountains Mathematical Publications, 47(1), 31–65. https://doi.org/10.2478/v10127-010-0030-9
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.