Nothing Special   »   [go: up one dir, main page]

×
Please click here if you are not redirected within a few seconds.
Due to short operand size, Hyperelliptic Curve Cryptosystem (HECC) of genus 3 is well suited for all kinds of embedded processor architectures, ...
Abstract. Due to short operand size, Hyperelliptic Curve Cryptosystem. (HECC) of genus 3 is well suited for all kinds of embedded processor architec-.
Menezes, A., Wu, Y., Zuccherato, R.: An elementary introduction to hyperelliptic curves, http://www.cacr.math.uwaterloo.ca/techreports/1997/tech-reports97.
Jul 4, 2024 · As a result, a new approach to public key cryptography known as hyperelliptic curve cryptosystem (HECC) has evolved (Mani and Gopi, 2013).
The HEC perspective trend is used to ensure the maintenance of the security of LWE and to provide effective performance in computation and communication ...
Abstract. For most of the time since they were proposed, it was widely believed that hyperelliptic curve cryptosystems (HECC) carry a substantial ...
Missing: Evolution | Show results with:Evolution
In 1989, Koblitz proposed using the jacobian of a hyperelliptic curve de ned over a nite eld to implement discrete logarithm cryptographic protocols.
Missing: Evolution | Show results with:Evolution
In the last years, curve based cryptography has seen tremendous develop ment. First proposed in 1985 by Koblitz and Miller, elliptic curve cryptography.
In this paper we discuss various aspects of cryptosystems based on hyperelliptic curves. In particular we cover the implementation of the group.
Hyperelliptic curves also appear composing entire connected components of certain strata of the moduli space of Abelian differentials.
Missing: Evolution | Show results with:Evolution
People also ask