Title | ||
---|---|---|
Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves |
Abstract | ||
---|---|---|
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located if? different e-cordilleras. |
Year | Venue | Keywords |
---|---|---|
2008 | JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY | Cryptography,Elliptic Curves,Isogeny Volcanoes |
DocType | Volume | Issue |
Journal | 40 | 4 |
ISSN | Citations | PageRank |
1443-458X | 1 | 0.37 |
References | Authors | |
5 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Josep M. Miret | 1 | 81 | 14.88 |
Rosana Tomàs | 2 | 7 | 1.26 |
Magda Valls | 3 | 67 | 8.68 |
D. Sadornil | 4 | 23 | 4.32 |
J. Tena | 5 | 15 | 2.99 |