• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 4,283
Next 10 →

On the construction of prime order elliptic curves

by Elisavet Konstantinou, Yannis C. Stamatiou, Christos Zaroliagis - Progress in cryptology—INDOCRYPT 2003, Springer Lecture Notes in Computer Science
"... Abstract. We consider a variant of the Complex Multiplication (CM) method for constructing elliptic curves (ECs) of prime order with additional security properties. Our variant uses Weber polynomials whose discriminant D is congruent to 3 (mod 8), and is based on a new transformation for converting ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Abstract. We consider a variant of the Complex Multiplication (CM) method for constructing elliptic curves (ECs) of prime order with additional security properties. Our variant uses Weber polynomials whose discriminant D is congruent to 3 (mod 8), and is based on a new transformation for converting

Pairing-friendly elliptic curves of prime order

by Paulo S. L. M. Barreto, Michael Naehrig - IN SELECTED AREAS IN CRYPTOGRAPHY – SAC 2005 , 2006
"... Previously known techniques to construct pairing-friendly curves of prime or near-prime order are restricted to embedding degree k � 6. More general methods produce curves over Fp where the bit length of p is often twice as large as that of the order r of the subgroup with embedding degree k; the b ..."
Abstract - Cited by 217 (13 self) - Add to MetaCart
; the best published results achieve ρ ≡ log(p) / log(r) ∼ 5/4. In this paper we make the first step towards surpassing these limitations by describing a method to construct elliptic curves of prime order and embedding degree k = 12. The new curves lead to very efficient implementation: non

Axiomatic quantum field theory in curved spacetime

by Stefan Hollands, Robert M. Wald , 2008
"... The usual formulations of quantum field theory in Minkowski spacetime make crucial use of features—such as Poincare invariance and the existence of a preferred vacuum state—that are very special to Minkowski spacetime. In order to generalize the formulation of quantum field theory to arbitrary globa ..."
Abstract - Cited by 689 (18 self) - Add to MetaCart
and covariantly constructed from the spacetime metric), a microlocal spectrum condition, an "associativity" condition, and the requirement that the coefficient of the identity in the OPE of the product of a field with its adjoint have positive scaling degree. We prove curved spacetime versions

The Contourlet Transform: An Efficient Directional Multiresolution Image Representation

by Minh N. Do, Martin Vetterli - IEEE TRANSACTIONS ON IMAGE PROCESSING
"... The limitations of commonly used separable extensions of one-dimensional transforms, such as the Fourier and wavelet transforms, in capturing the geometry of image edges are well known. In this paper, we pursue a “true” two-dimensional transform that can capture the intrinsic geometrical structure t ..."
Abstract - Cited by 513 (20 self) - Add to MetaCart
-domain construction and then studies its convergence to an expansion in the continuous domain. Specifically, we construct a discrete-domain multiresolution and multidirection expansion using non-separable filter banks, in much the same way that wavelets were derived from filter banks. This construction results in a

Constructing elliptic curves of prime order

by Reinier Bröker, Peter Stevenhagen , 2007
"... ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
Abstract not found

Generating Prime Order Elliptic Curves: Difficulties and Efficiency

by Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C. Stamatiou, Christos Zaroliagis - Considerations, in International Conference on Information Security and Cryptology – ICISC 2004, Lecture Notes in Computer Science , 2005
"... Abstract. We consider the generation of prime order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the roots of a special type of class field polynomials with the most commonly used being the Hilbert and Weber one ..."
Abstract - Cited by 4 (4 self) - Add to MetaCart
Abstract. We consider the generation of prime order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the roots of a special type of class field polynomials with the most commonly used being the Hilbert and Weber

On the Efficient Generation of Prime-Order Elliptic Curves∗

by Elisavet Konstantinou, Aristides Kontogeorgis, Yannis C Stamatiou, Christos Zaroliagis , 2009
"... Abstract. We consider the generation of prime-order elliptic curves (ECs) over a prime field Fp using the Complex Multiplication (CM) method. A crucial step of this method is to compute the roots of a special type of class field polynomials with the most commonly used being the Hilbert and Weber one ..."
Abstract - Add to MetaCart
ones. These polynomials are uniquely determined by the CM discriminant D. In this paper, we consider a variant of the CM method for constructing elliptic curves (ECs) of prime order using Weber polynomials. In attempting to construct prime-order ECs using Weber polynomials, two difficulties arise (in

Selecting Cryptographic Key Sizes

by Arjen K. Lenstra, Eric R. Verheul - TO APPEAR IN THE JOURNAL OF CRYPTOLOGY, SPRINGER-VERLAG , 2001
"... In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated parameter ..."
Abstract - Cited by 323 (8 self) - Add to MetaCart
In this article we offer guidelines for the determination of key sizes for symmetric cryptosystems, RSA, and discrete logarithm based cryptosystems both over finite fields and over groups of elliptic curves over prime fields. Our recommendations are based on a set of explicitly formulated

A taxonomy of pairing-friendly elliptic curves

by David Freeman, Michael Scott, Edlyn Teske , 2006
"... Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curves are rare and thus require specific constructions. In this paper we give a single coherent framework that encompasses all ..."
Abstract - Cited by 111 (11 self) - Add to MetaCart
Elliptic curves with small embedding degree and large prime-order subgroup are key ingredients for implementing pairingbased cryptographic systems. Such “pairing-friendly” curves are rare and thus require specific constructions. In this paper we give a single coherent framework that encompasses

Generating Elliptic Curves of Prime Order

by Thomas A. Schmidt, Çetin K. Koç - in Cryptographic Hardware and Embedded Systems – CHES 2001, LNCS , 2001
"... Abstract. Avariation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in the mildly restricted setting of prime curve order. These may be seen to corroborate earlier work of Koblitz in the ..."
Abstract - Cited by 6 (0 self) - Add to MetaCart
Abstract. Avariation of the Complex Multiplication (CM) method for generating elliptic curves of known order over finite fields is proposed. We give heuristics and timing statistics in the mildly restricted setting of prime curve order. These may be seen to corroborate earlier work of Koblitz
Next 10 →
Results 1 - 10 of 4,283
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University