Exploiting isogeny cordillera structure to obtain cryptographically good elliptic curves

Autor/a

Miret, Josep M. (Josep Maria)

Tomàs, Rosana

Valls Marsal, Magda

Sadornil Renedo, Daniel

Tena Ayuso, Juan

Data de publicació

2016-02-05T13:10:32Z

2025-01-01

2008



Resum

The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l–cordilleras.

Tipus de document

article
publishedVersion

Llengua

Anglès

Matèries i paraules clau

Cryptography; Elliptic Curves; Isogeny Volcanoes; Criptografia; Corbes el·líptiques

Publicat per

Australian Computer Society Inc

Documents relacionats

Reproducció del document publicat a http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.263.pdf

Journal of Research and Practice in Information Technology, 2008, vol. 40, núm. 4, p. 263-273

Drets

(c) Australian Computer Society Inc, 2008

Aquest element apareix en la col·lecció o col·leccions següent(s)