Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,397,758 papers from all fields of science
Search
Sign In
Create Free Account
Hyperelliptic curve cryptography
Known as:
HECC
, Hyper Elliptic Curve Cryptography
, Hyper-Elliptic Curve Cryptography
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
9 relations
Centre for Applied Cryptographic Research
Diffie–Hellman key exchange
Discrete logarithm
Genus (mathematics)
Expand
Broader (2)
Elliptic curve cryptography
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Encryption Scheme Based on Hyperelliptic Curve Cryptography
Asha Liza John
,
Sabu M. Thampi
International Conference on Security, Privacy…
2016
Corpus ID: 34885971
In modern times, common man uses small computing devices like mobile phones, RFID systems and embedded systems. Such devices are…
Expand
2015
2015
A Secured Public Key Cryptosystem for Biometric Encryption
M. Gobi
,
D. Kannan
2015
Corpus ID: 8501556
††† , Summary In the modern era security plays an important role in each and every field. The needs for stringent security…
Expand
2012
2012
Isolated Curves for Hyperelliptic Curve Cryptography
Wen-Huan Wang
2012
Corpus ID: 117582689
We introduce the notion of isolated genus two curves. There is no known efficient algorithm to explicitly construct isogenies…
Expand
2009
2009
A New Digital Envelope Approach for Secure Electronic Medical Records
M. Gobi
,
Lecturers
,
K. Vivekanandan
2009
Corpus ID: 17914463
Summary In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure…
Expand
2009
2009
A MicroBlaze specific co-processor for real-time hyperelliptic curve cryptography on Xilinx FPGAs
Alexander Klimm
,
O. Sander
,
J. Becker
IEEE International Symposium on Parallel…
2009
Corpus ID: 10733725
A Hardware/Software Codesign approach based on a MicroBlaze softcore processor and a GF2n-coprocessor module to form a minimal…
Expand
2007
2007
Hardware architectures of elliptic curve based cryptosytems over binary fields
K. Gaj
,
Chang Shu
2007
Corpus ID: 123927366
Public key cryptosystems were invented in 1976 by Whitfield Diffie and Martin Hellman to solve the security problems such as…
Expand
Highly Cited
2006
Highly Cited
2006
Optimum Digit Serial GF(2^m) Multipliers for Curve-Based Cryptography
Sandeep S. Kumar
,
Thomas J. Wollinger
,
C. Paar
IEEE transactions on computers
2006
Corpus ID: 15536347
Digit serial multipliers are used extensively in hardware implementations of elliptic and hyperelliptic curve cryptography. This…
Expand
2005
2005
A hyperelliptic curve crypto coprocessor for an 8051 microcontroller
A. Hodjat
,
D. Hwang
,
L. Batina
,
I. Verbauwhede
IEEE Workshop on Signal Processing Systems Design…
2005
Corpus ID: 5107780
This paper presents a microcode instruction set coprocessor which is designed to work with an 8-bit 8051 microcontroller and…
Expand
Review
2004
Review
2004
An Introduction to Elliptic and Hyperelliptic Curve Cryptography and the NTRU Cryptosystem
J. Scholten
,
F. Vercauteren
2004
Corpus ID: 16710725
This paper provides a self-contained introduction to elliptic and hyperelliptic curve cryptography and to the NTRU cryptosystem…
Expand
2004
2004
Finding optimum parallel coprocessor design for genus 2 hyperelliptic curve cryptosystems
G. Bertoni
,
L. Breveglieri
,
Thomas J. Wollinger
,
C. Paar
International Conference on Information…
2004
Corpus ID: 3211736
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithmetic-intensive public-key…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE
or Only Accept Required