Handbook of Elliptic and Hyperelliptic Curve Cryptography最新文献

筛选
英文 中文
Varieties over Special Fields 特殊领域的品种
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch5
G. Frey, T. Lange
{"title":"Varieties over Special Fields","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch5","DOIUrl":"https://doi.org/10.1201/9781420034981.ch5","url":null,"abstract":"In the previous chapter we dealt with algebraic and geometric objects over arbitrary fields. In this chapter we explain additional properties of these objects when considered over special fields. We concentrate on varieties over the complex numbers and finite fields.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"172 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126065585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Background on Weil Descent Weil Descent的背景
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch7
G. Frey, T. Lange
{"title":"Background on Weil Descent","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch7","DOIUrl":"https://doi.org/10.1201/9781420034981.ch7","url":null,"abstract":"Weil descent — or, as it is alternatively called — scalar restriction, is a well-known technique in algebraic geometry. It is applicable to all geometric objects like curves, differentials, and Picard groups, if we work over a separable field L of degree d of a ground field K. It relates t-dimensional objects over L to td-dimensional objects over K. As guideline the reader should use the theory of algebraic curves over C, which become surfaces over R. This example, detailed in Section 5.1.2, already shows that the structure of the objects after scalar restriction can be much richer: the surfaces we get from algebraic curves carry the structure of a Riemann surface and so methods from topology and Kahler manifolds can be applied to questions about curves over C. This was the reason to suggest that Weil descent should be studied with respect to (constructive and destructive) applications for DL systems [FRE 1998]. We shall come to such applications in Sections 15.3 and 22.3. In the next two sections we give a short sketch of the mathematical properties of Weil descent. The purpose is to provide a mathematical basis for the descent and show how to construct it. For a thorough discussion in the frame of algebraic geometry and using the language of schemes, we refer to [Die 2001]","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121458602","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background on Pairings 配对的背景
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch6
S. Duquesne, G. Frey
{"title":"Background on Pairings","authors":"S. Duquesne, G. Frey","doi":"10.1201/9781420034981.ch6","DOIUrl":"https://doi.org/10.1201/9781420034981.ch6","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130117846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Pairing-Based Cryptography 双线性密码
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch24
S. Duquesne, T. Lange
{"title":"Pairing-Based Cryptography","authors":"S. Duquesne, T. Lange","doi":"10.1201/9781420034981.ch24","DOIUrl":"https://doi.org/10.1201/9781420034981.ch24","url":null,"abstract":"Chapter 23 showed us how to build DL systems on the Jacobian of curves. In Chapter 1 we introduced DL systems with bilinear structure. In this chapter we first give more applications of this construction, namely the extension of the tripartite protocol given before to multiparty key exchange, identity-based cryptography, and short signatures. In recent years many systems using this extra structure have been proposed. We include some more references to further work in the respective sections, since giving a complete survey of all these schemes is completely out of the scope of this book. For a collection of results on pairings we refer to the \"Pairing-Based Crypto Lounge\" [BAR]. The second section is devoted to realizations of such systems. In Chapter 6 we gave the mathematical theory for the Tate–Lichtenbaum pairing and Chapter 16 provided algorithms for efficient evaluation of this pairing on elliptic curves and the Jacobian of hyperelliptic curves. There we assumed that the embedding degree (i.e., the degree k of the extension field Fqk to which the pairing maps), is small, so as to guarantee an efficiently computable map as required in a DL system with bilinear structure. In Section 24.2 we explain for which curves and fields these requirements can be satisfied and give constructions.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115346878","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 90
Arithmetic of Special Curves 特殊曲线的算法
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch15
C. Doche, T. Lange
{"title":"Arithmetic of Special Curves","authors":"C. Doche, T. Lange","doi":"10.1201/9781420034981.ch15","DOIUrl":"https://doi.org/10.1201/9781420034981.ch15","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127299664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Compositeness and Primality Testing Factoring 组合性和素数检验分解
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch25
R. Avanzi, H. Cohen
{"title":"Compositeness and Primality Testing Factoring","authors":"R. Avanzi, H. Cohen","doi":"10.1201/9781420034981.ch25","DOIUrl":"https://doi.org/10.1201/9781420034981.ch25","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"88 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126089043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Background on p-adic Numbers p进数的背景知识
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch3
D. Lubicz
{"title":"Background on p-adic Numbers","authors":"D. Lubicz","doi":"10.1201/9781420034981.ch3","DOIUrl":"https://doi.org/10.1201/9781420034981.ch3","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122759699","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arithmetic of p-adic Numbers p进数的算术
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch12
F. Vercauteren
{"title":"Arithmetic of p-adic Numbers","authors":"F. Vercauteren","doi":"10.1201/9781420034981.ch12","DOIUrl":"https://doi.org/10.1201/9781420034981.ch12","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130341451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Background on Curves and Jacobians 曲线和雅可比矩阵的背景知识
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.ch4
G. Frey, T. Lange
{"title":"Background on Curves and Jacobians","authors":"G. Frey, T. Lange","doi":"10.1201/9781420034981.ch4","DOIUrl":"https://doi.org/10.1201/9781420034981.ch4","url":null,"abstract":"This chapter introduces the main characters of this book — curves and their Jacobians. To this aim we give a brief introduction to algebraic and arithmetic geometry. We first deal with arbitrary varieties and abelian varieties to give the general definitions in a concise way. Then we concentrate on Jacobians of curves and their arithmetic properties, where we highlight elliptic and hyperelliptic curves as main examples. The reader not interested in the mathematical background may skip the complete chapter as the chapters on implementation summarize the necessary mathematical properties. For full details and proofs we refer the interested reader to the books [CAFL 1996, FUL 1969, LOR 1996, SIL 1986, STI 1993, ZASA 1976]. Throughout this chapter let K denote a perfect field (cf. Chapter 2) and K its algebraic closure. Let L be an extension field of K. Its absolute Galois group AutL(L) is denoted by GL.","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125436321","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Generic Algorithms for Computing Discrete Logarithms 计算离散对数的通用算法
Handbook of Elliptic and Hyperelliptic Curve Cryptography Pub Date : 2005-07-19 DOI: 10.1201/9781420034981.pt5
R. Avanzi
{"title":"Generic Algorithms for Computing Discrete Logarithms","authors":"R. Avanzi","doi":"10.1201/9781420034981.pt5","DOIUrl":"https://doi.org/10.1201/9781420034981.pt5","url":null,"abstract":"","PeriodicalId":131128,"journal":{"name":"Handbook of Elliptic and Hyperelliptic Curve Cryptography","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126186765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信