Results 1 
4 of
4
Counting the Number of Points on Elliptic Curves Over Finite Fields: Strategies and Performances
, 1995
"... Cryptographic schemes using elliptic curves over finite fields require the computation of the cardinality of the curves. Dramatic progress have been achieved recently in that field by various authors. The aim of this article is to highlight part of these improvements and to describe an efficient imp ..."
Abstract

Cited by 34 (5 self)
 Add to MetaCart
Cryptographic schemes using elliptic curves over finite fields require the computation of the cardinality of the curves. Dramatic progress have been achieved recently in that field by various authors. The aim of this article is to highlight part of these improvements and to describe an efficient implementation of them in the particular case of the fields GF (2 n ), for n 600. 1 Introduction Elliptic curves have been used successfully to factor integers [26, 36], and prove the primality of large integers [6, 15, 4]. Moreover they turned out to be an interesting alternative to the use of Z=NZ in cryptographical schemes [33, 21]. Elliptic curve cryptosystems over finite fields have been built, see [5, 30]; some have been proposed in Z=NZ, N composite [23, 12, 42]. More applications were studied in [19, 22]. The interested reader should also consult [31]. In order to perform key exchange algorithms using an elliptic curve E over a finite field K, the cardinality of E must be known. Th...
Design of Hyperelliptic Cryptosystems in small Characteristic and a Software Implementation over F2 n
 In Advances in Cryptology  ASIACRYPT '98
, 1998
"... Abstract. We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for publickey cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attac ..."
Abstract

Cited by 14 (0 self)
 Add to MetaCart
Abstract. We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for publickey cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and PentiumII computers. Our results indicate that if we choose curves carefully, hyperelliptic cryptosystems do have practical performance.
Efficient Implementation of Schoof's Algorithm
 Advances in Cryptology { ASIACRYPT '98
, 1999
"... . Schoof's algorithm is used to find a secure elliptic curve for cryptosystems, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field. By realizing efficient combination of several improvements, such as AtkinElkies's method, the isogeny cy ..."
Abstract

Cited by 5 (0 self)
 Add to MetaCart
. Schoof's algorithm is used to find a secure elliptic curve for cryptosystems, as it can compute the number of rational points on a randomly selected elliptic curve defined over a finite field. By realizing efficient combination of several improvements, such as AtkinElkies's method, the isogeny cycles method, and trial search by matchandsort techniques, we can count the number of rational points on an elliptic curve over GF (p) in a reasonable time, where p is a prime whose size is around 240bits. 1 Introduction When we use the elliptic curve cryptosystem [9, 17] (ECC for short), we first have to define an elliptic curve over a finite field. Then, all cryptographic operations will be performed on the group of rational points on the curve. Since all the curves are not necessarily secure, we should be very careful when we choose an elliptic curve for ECC. There are several methods to select a curve for ECC, such as Schoof's method [22], CM(Complex Multiplication) method [2, 18, 10,...
Counting points on elliptic curves over F p n using Couveignes's algorithm
, 1995
"... The heart of the improvements of Elkies to Schoof's algorithm for computing the cardinality of elliptic curves over a finite field is the ability to compute isogenies between curves. Elkies' approach was well suited for the case where the characteristic of the field is large. Couveignes showed how t ..."
Abstract

Cited by 1 (0 self)
 Add to MetaCart
The heart of the improvements of Elkies to Schoof's algorithm for computing the cardinality of elliptic curves over a finite field is the ability to compute isogenies between curves. Elkies' approach was well suited for the case where the characteristic of the field is large. Couveignes showed how to compute isogenies in small characteristic. The aim of this paper is to describe the first successful implementation of Couveignes's algorithm and to give numerous computational examples. In particular, we describe the use of fast algorithms for performing incremental operations on series. We will also insist on the particular case of the characteristic 2. 1 Introduction Elliptic curves have been used successfully to factor integers [25, 34], and prove the primality of large integers [4, 18, 3]. Moreover they turned out to be an interesting alternative to the use of Z=NZin cryptographical schemes. The first schemes were presented in [33, 23] and followed by many more (see for instance [31...