Hyperelliptic curve cryptography

Known as: HECC, Hyper Elliptic Curve Cryptography, Hyper-Elliptic Curve Cryptography 
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The use of elliptic-curve groups in cryptography, suggested by Miller [1] and Koblitz [2] three decades ago, provides the same… (More)
Is this relevant?
2014
2014
In today's world, Cloud computing has attracted research communities as it provides services in reduced cost due to virtualizing… (More)
Is this relevant?
2013
2013
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real… (More)
  • figure 3.1
Is this relevant?
2011
2011
Definition 1. Let k be a field. An algebraic variety over k is a k-scheme X such that there exists a covering by a finite number… (More)
Is this relevant?
2010
2010
At present, most of e-commerce applications are developed using asymmetric cryptography to guarantee the authentication of the… (More)
  • table 1
  • figure 1
  • table 2
Is this relevant?
2010
2010
An integrated cryptographic processor for public key cryptography for embedded systems is proposed in this contribution. The… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table I
Is this relevant?
Highly Cited
2005
Highly Cited
2005
MR2162716 (2007f:14020) 14G50 (11G05 11G07 11T71 94-00 94A60) FHandbook of elliptic and hyperelliptic curve cryptography. Edited… (More)
Is this relevant?
Review
2004
Review
2004
This paper provides a self-contained introduction to elliptic and hyperelliptic curve cryptography and to the NTRU cryptosystem… (More)
  • table 1
Is this relevant?
2003
2003
The optimization of the Harley algorithm is an active area of hyperelliptic curve cryptography. We propose an efficient method… (More)
  • table 1
  • table 2
  • table 3
  • table 4
  • table 4
Is this relevant?
2002
2002
Hyperelliptic curve cryptography with genus larger than one has not been seriously considered for cryptographic purposes because… (More)
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?