Skip to search formSkip to main contentSkip to account menu

Hyperelliptic curve cryptography

Known as: HECC, Hyper Elliptic Curve Cryptography, Hyper-Elliptic Curve Cryptography 
Hyperelliptic curve cryptography is similar to elliptic curve cryptography (ECC) insofar as the Jacobian of a hyperelliptic curve is an abelian group… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
††† , Summary In the modern era security plays an important role in each and every field. The needs for stringent security… 
2012
2012
We introduce the notion of isolated genus two curves. There is no known efficient algorithm to explicitly construct isogenies… 
2009
2009
In hyperelliptic curve cryptography, finding a suitable hyperelliptic curve is an important fundamental problem. One of necessary… 
2009
2009
Summary In the Metical sector doctors, patient and nurses need to have access to the medical records efficiently and in a secure… 
2009
2009
A Hardware/Software Codesign approach based on a MicroBlaze softcore processor and a GF2n-coprocessor module to form a minimal… 
Highly Cited
2006
Highly Cited
2006
Digit serial multipliers are used extensively in hardware implementations of elliptic and hyperelliptic curve cryptography. This… 
2006
2006
Hardware/software co-design of computationally intensive cryptosystems is the preferred solution to achieve the required speed… 
2005
2005
This paper presents a microcode instruction set coprocessor which is designed to work with an 8-bit 8051 microcontroller and… 
Review
2004
Review
2004
This paper provides a self-contained introduction to elliptic and hyperelliptic curve cryptography and to the NTRU cryptosystem… 
2004
2004
Hardware accelerators are often used in cryptographic applications for speeding up the highly arithmetic-intensive public-key…