Abstract | ||
---|---|---|
A morphism from an algebraic curve C to an elliptic curve is called an elliptic subcover of the curve C. Elliptic subcovers provide means of solving discrete logarithm problem in elliptic curves over extension fields. The GHS attack yields only degree 2 minimal elliptic subcovers of hyperelliptic curves of genus 3. In this paper, we study the properties of elliptic subcovers of genus 3 hyperelliptic curves. Using these properties, we find some minimal elliptic subcovers of degree 4, which can not be constructed by GHS attack. |
Year | DOI | Venue |
---|---|---|
2015 | 10.1007/978-3-319-17533-1_13 | INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 |
Keywords | Field | DocType |
Elliptic Subcover, Hyperelliptic Curve, Discrete Logarithm Problem, GHS Attack | Discrete mathematics,Hyperelliptic curve,Supersingular elliptic curve,Twists of curves,Hyperelliptic curve cryptography,Jacobian curve,Hessian form of an elliptic curve,Schoof's algorithm,Edwards curve,Mathematics | Conference |
Volume | ISSN | Citations |
9065 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 4 | 4 |
Name | Order | Citations | PageRank |
---|---|---|---|
Song Tian | 1 | 6 | 3.56 |
Wei Yu | 2 | 9 | 5.26 |
Bao Li | 3 | 185 | 38.33 |
Kunpeng Wang | 4 | 41 | 11.79 |