Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves
Sadornil Renedo, Daniel
Tena Ayuso, Juan
MetadataShow full item record
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good
elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l–cordilleras.
Is part ofJournal of Research and Practice in Information Technology, 2008, vol. 40, núm. 4, p. 263-273
The following license files are associated with this item:
Showing items related by title, author, creator and subject.
Miret, Josep M. (Josep Maria); Sadornil Renedo, Daniel; Tena Ayuso, Juan; Tomàs Cuñat, Rosa Ana; Valls Marsal, Magda (Universitat Autònoma de Barcelona. Departament de Matemàtiques, 2007)This paper is devoted to the study of the volcanoes of l-isogenies of elliptic curves over a finite field, focusing on their height as well as on the location of curves across its different levels. The core of the paper ...
Martínez Rodríguez, Santi; Valls Marsal, Magda; Roig Mateu, Concepció; Miret, Josep M. (Josep Maria); Giné, Francesc (Springer Verlag, 2009)Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high ...
Fouquet, Mireille; Miret, Josep M. (Josep Maria); Valera Martín, Javier (Springer International Publishing Switzerland, 2015)Given an ordinary elliptic curve over a finite field located in the floor of its volcano of ℓ-isogenies, we present an efficient procedure to take an ascending path from the floor to the level of stability and back to ...