Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves

dc.contributor.authorMiret, Josep M. (Josep Maria)
dc.contributor.authorTomàs, Rosana
dc.contributor.authorValls Marsal, Magda
dc.contributor.authorSadornil Renedo, Daniel
dc.contributor.authorTena Ayuso, Juan
dc.date.accessioned2016-02-05T13:10:32Z
dc.date.embargoEndDate2025-01-01
dc.date.issued2008
dc.description.abstractThe security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l–cordilleras.ca_ES
dc.identifier.idgrec013558
dc.identifier.issn1443-458X
dc.identifier.urihttp://hdl.handle.net/10459.1/49456
dc.language.isoengca_ES
dc.publisherAustralian Computer Society Incca_ES
dc.relation.isformatofReproducció del document publicat a http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.263.pdfca_ES
dc.relation.ispartofJournal of Research and Practice in Information Technology, 2008, vol. 40, núm. 4, p. 263-273ca_ES
dc.rights(c) Australian Computer Society Inc, 2008ca_ES
dc.rights.accessRightsinfo:eu-repo/semantics/restrictedAccessca_ES
dc.subjectCryptographyca_ES
dc.subjectElliptic Curvesca_ES
dc.subjectIsogeny Volcanoesca_ES
dc.subject.otherCriptografiaca_ES
dc.subject.otherCorbes el·líptiquesca_ES
dc.titleExploiting isogeny cordillera structure to obtain cryptographically good elliptic curvesca_ES
dc.typearticleca_ES
dc.type.versionpublishedVersionca_ES
Files
License bundle
Now showing 1 - 1 of 1
Loading...
Thumbnail Image
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: