Sciweavers

9 search results - page 1 / 2
» Two Topics in Hyperelliptic Cryptography
Sort
View
SACRYPT
2001
Springer
13 years 10 months ago
Two Topics in Hyperelliptic Cryptography
Florian Hess, Gadiel Seroussi, Nigel P. Smart
ISCAS
2007
IEEE
132views Hardware» more  ISCAS 2007»
13 years 12 months ago
Public-Key Cryptography on the Top of a Needle
Abstract— This work describes the smallest known hardware implementation for Elliptic/Hyperelliptic Curve Cryptography (ECC/HECC). We propose two solutions for Publickey Cryptogr...
Lejla Batina, Nele Mentens, Kazuo Sakiyama, Bart P...
CHES
2003
Springer
106views Cryptology» more  CHES 2003»
13 years 11 months ago
Hyperelliptic Curve Cryptosystems: Closing the Performance Gap to Elliptic Curves
For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial performance penalty compared to elliptic cur...
Jan Pelzl, Thomas J. Wollinger, Jorge Guajardo, Ch...
AAECC
2006
Springer
133views Algorithms» more  AAECC 2006»
13 years 5 months ago
On the low hamming weight discrete logarithm problem for nonadjacent representations
So-called nonadjacent representations are commonly used in elliptic curve cryptography to facilitate computing a scalar multiple of a point on an elliptic curve. A nonadjacent rep...
James A. Muir, Douglas R. Stinson