Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves
Sadornil Renedo, Daniel
Tena Ayuso, Juan
MetadataShow full item record
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l–cordilleras.
Is part ofJournal of Research and Practice in Information Technology, 2008, vol. 40, núm. 4, p. 263-273
European research projects
The following license files are associated with this item:
Showing items related by title, author, creator and subject.
Miret, Josep M. (Josep Maria); Sadornil Renedo, Daniel; Tena Ayuso, Juan; Tomàs Cuñat, Rosa Ana; Valls Marsal, Magda (Universitat Autònoma de Barcelona. Departament de Matemàtiques, 2007)This paper is devoted to the study of the volcanoes of l-isogenies of elliptic curves over a finite field, focusing on their height as well as on the location of curves across its different levels. The core of the paper ...
Martínez Rodríguez, Santi; Valls Marsal, Magda; Roig Mateu, Concepció; Miret, Josep M. (Josep Maria); Giné, Francesc (Springer Verlag, 2009)Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased. Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high ...
Martínez Rodríguez, Santi; Miret, Josep M. (Josep Maria); Valls Marsal, Magda; Tomàs, Rosana (Natural Sciences Publishing, 2014)The amount of information stored in databases is constantly increasing. Databases contain multiple records, each of them divided in several data fields. And some of these fields may contain sensitive information, so there ...