Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Hyperelliptic curve cryptography

Known as: HECC, Hyper Elliptic Curve Cryptography, Hyper-Elliptic Curve Cryptography 
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2013
2013
This paper presents the performance evaluation of asymmetric cryptographic algorithms oriented to embedded platforms used in… Expand
  • table I
  • figure 1
  • figure 2
  • figure 3
  • table II
Is this relevant?
2011
2011
Depuis le milieu des annees 1980, les varietes abeliennes ont ete abondamment utilisees en cryptographie a cle publique: le… Expand
  • figure 2.1
  • figure 2.2
  • figure 2.3
  • figure 2.4
  • table 4.4
Is this relevant?
2007
2007
In this paper we provide explicit formulae to compute bilinear pairings in compressed form. We indicate families of curves where… Expand
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Digit serial multipliers are used extensively in hardware implementations of elliptic and hyperelliptic curve cryptography. This… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 9
  • table I
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Preface Introduction to Public-Key Cryptography Mathematical Background Algebraic Background Background on p-adic Numbers… Expand
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Fix a small, non-empty set of blockcipher keys K. We say a blockcipher-based hash function is highly-efficient if it makes… Expand
Is this relevant?
2005
2005
Implementing public-key cryptography on platforms with limited resources, such as microprocessors, is a challenging task… Expand
  • table 1
  • figure 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2004
Highly Cited
2004
We present a general technique for the efficient computation of pairings on Jacobians of supersingular curves. This formulation… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Is this relevant?
2004
2004
Cryptographic algorithms are used in a large variety of different applications to ensure security services. It is, thus, very… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
2002
2002
Hyperelliptic curve cryptography with genus larger than one has not been seriously considered for cryptographic purposes because… Expand
  • table 1
  • figure 1
  • table 2
  • figure 2
  • table 3
Is this relevant?