Title
Isogeny cordillera algorithm to obtain cryptographically good elliptic curves
Abstract
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l-cordilleras.
Year
Venue
Keywords
2007
ACSW Frontiers
different volcano,elliptic curve,elliptic curve discrete logarithm,elliptic curve cryptosystems,isogeny cordillera algorithm,successive chain,computationally unfeasible,different l-cordilleras,cryptographically good elliptic curve,elliptic curves,cryptography
Field
DocType
ISBN
Discrete mathematics,Supersingular elliptic curve,Twists of curves,Modular elliptic curve,Algorithm,Elliptic curve point multiplication,Elliptic curve cryptography,Hessian form of an elliptic curve,Counting points on elliptic curves,Mathematics,Schoof's algorithm
Conference
1-920-68285-X
Citations 
PageRank 
References 
2
0.40
5
Authors
5
Name
Order
Citations
PageRank
J. Miret1141.94
D. Sadornil2234.32
J. Tena3152.99
R. Tomàs420.40
M. Valls591.07