Skip to search formSkip to main contentSkip to account menu

Hyperelliptic curve cryptography

Known as: HECC, Hyper Elliptic Curve Cryptography, Hyper-Elliptic Curve Cryptography 
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Authentication is one the important parameters in designing security for vehicular ad hoc network (VANET). Authentication… 
2016
2016
One of the popular area in Information Technology (IT) is Cloud computing. It provides services such as Software as a Service… 
2016
2016
The evolution of WBANs under the medical health care field is vital for human survival and security of patients’ personnel… 
2015
2015
††† , Summary In the modern era security plays an important role in each and every field. The needs for stringent security… 
2014
2014
Mobile Instant Messenger is an IM application that need communication fastly and in a secured manner. A good level security with… 
2013
2013
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real… 
2012
2012
We introduce the notion of isolated genus two curves. There is no known efficient algorithm to explicitly construct isogenies… 
2011
2011
For any relatively minimal hyperelliptic fibration f with slope four, there exists the inequality with respect to the relative… 
2009
2009
Summary In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure… 
2008
2008
This paper presents the design and implementation of a hyperelliptic curve cryptography (HECC) coprocessor over affine and…