Skip to search formSkip to main contentSkip to account menu

Hyperelliptic curve cryptography

Known as: HECC, Hyper Elliptic Curve Cryptography, Hyper-Elliptic Curve Cryptography 
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
In modern times, common man uses small computing devices like mobile phones, RFID systems and embedded systems. Such devices are… 
2015
2015
††† , Summary In the modern era security plays an important role in each and every field. The needs for stringent security… 
2012
2012
We introduce the notion of isolated genus two curves. There is no known efficient algorithm to explicitly construct isogenies… 
2009
2009
Summary In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure… 
2009
2009
A Hardware/Software Codesign approach based on a MicroBlaze softcore processor and a GF2n-coprocessor module to form a minimal… 
2007
2007
Public key cryptosystems were invented in 1976 by Whitfield Diffie and Martin Hellman to solve the security problems such as… 
Highly Cited
2006
Highly Cited
2006
Digit serial multipliers are used extensively in hardware implementations of elliptic and hyperelliptic curve cryptography. This… 
2005
2005
This paper presents a microcode instruction set coprocessor which is designed to work with an 8-bit 8051 microcontroller and… 
Review
2004
Review
2004
This paper provides a self-contained introduction to elliptic and hyperelliptic curve cryptography and to the NTRU cryptosystem… 
2004
2004
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithmetic-intensive public-key…