Montgomery curves and their arithmetic: The case of large characteristic fields
C Costello, B Smith - Journal of Cryptographic Engineering, 2018 - Springer
Three decades ago, Montgomery introduced a new elliptic curve model for use in Lenstra's
ECM factorization algorithm. Since then, his curves and the algorithms associated with them …
ECM factorization algorithm. Since then, his curves and the algorithms associated with them …
[PDF][PDF] Faster computation of isogenies of large prime degree
D Bernstein - 2020 - iacr.steepath.eu
Abstract Let ℰ∕ 𝔽 q be an elliptic curve, and P a point in ℰ (𝔽 q) of prime order ℓ. Vélu's
formulæ let us compute a quotient curve ℰ′= ℰ∕⟨ P⟩ and rational maps defining a …
formulæ let us compute a quotient curve ℰ′= ℰ∕⟨ P⟩ and rational maps defining a …
[图书][B] Handbook of finite fields
GL Mullen, D Panario - 2013 - api.taylorfrancis.com
The CRC Handbook of Finite Fields (hereafter referred to as the Handbook) is a reference
book for the theory and applications of finite fields. It is not intended to be an introductory …
book for the theory and applications of finite fields. It is not intended to be an introductory …
An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between
products of elliptic curves in the theta model. The description of the algorithm is split into …
products of elliptic curves in the theta model. The description of the algorithm is split into …
Four: four-dimensional decompositions on a-curve over the mersenne prime
C Costello, P Longa - International Conference on the Theory and …, 2015 - Springer
We introduce Four Q, a high-security, high-performance elliptic curve that targets the 128-bit
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …
security level. At the highest arithmetic level, cryptographic scalar multiplications on Four Q …
Fast cryptography in genus 2
In this paper, we highlight the benefits of using genus 2 curves in public-key cryptography.
Compared to the standardized genus 1 curves, or elliptic curves, arithmetic on genus 2 …
Compared to the standardized genus 1 curves, or elliptic curves, arithmetic on genus 2 …
Fast change of level and applications to isogenies
D Lubicz, D Robert - Research in Number Theory, 2023 - Springer
Abstract Let (A, L, Θ n) be a dimension g abelian variety together with a level n theta
structure over a field k of odd characteristic. We thus denote by (θ i Θ L)(Z/n Z) g∈ Γ (A, L) …
structure over a field k of odd characteristic. We thus denote by (θ i Θ L)(Z/n Z) g∈ Γ (A, L) …
Genus 2 point counting over prime fields
For counting points of Jacobians of genus 2 curves over a large prime field, the best known
approach is essentially an extension of Schoof's genus 1 algorithm. We propose various …
approach is essentially an extension of Schoof's genus 1 algorithm. We propose various …
Kummer strikes back: new DH speed records
This paper sets new speed records for high-security constant-time variable-base-point Diffie–
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …
Hellman software: 305395 Cortex-A8-slow cycles; 273349 Cortex-A8-fast cycles; 88916 …
ECM using Edwards curves
This paper introduces EECM-MPFQ, a fast implementation of the elliptic-curve method of
factoring integers. EECM-MPFQ uses fewer modular multiplications than the well-known …
factoring integers. EECM-MPFQ uses fewer modular multiplications than the well-known …