Cryptographic aspects of real hyperelliptic curves

5Citations
Citations of this article
25Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we give an overview of cryptographic applications using real hyperelliptic curves. We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols. We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in genus 2, and advances in solving the infrastructure discrete logarithm problem, whose presumed intractability is the basis of security for the related cryptographic protocols. © 2010, Versita. All rights reserved.

Cite

CITATION STYLE

APA

Jacobson, M. J., Scheidler, R., & Stein, A. (2010). Cryptographic aspects of real hyperelliptic curves. Tatra Mountains Mathematical Publications, 47(1), 31–65. https://doi.org/10.2478/v10127-010-0030-9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free