Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

Yasuyuki Sakai, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsKazuo Ohta, Dingyi Pei
PublisherSpringer Verlag
Pages80-94
Number of pages15
ISBN (Print)3540651098, 9783540651093
Publication statusPublished - Jan 1 1998
Event4th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 1998 - Beijing, China
Duration: Oct 18 1998Oct 22 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1514
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other4th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 1998
CountryChina
CityBeijing
Period10/18/9810/22/98

Fingerprint

Hyperelliptic Curves
Cryptosystem
Cryptography
Discrete Logarithm Problem
Public-key Cryptosystem
Software
Resist
Galois field
Choose
Attack
Design

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Cite this

Sakai, Y., & Sakurai, K. (1998). Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n. In K. Ohta, & D. Pei (Eds.), Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings (pp. 80-94). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1514). Springer Verlag.

Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n. / Sakai, Yasuyuki; Sakurai, Kouichi.

Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. ed. / Kazuo Ohta; Dingyi Pei. Springer Verlag, 1998. p. 80-94 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1514).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sakai, Y & Sakurai, K 1998, Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n. in K Ohta & D Pei (eds), Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 1514, Springer Verlag, pp. 80-94, 4th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 1998, Beijing, China, 10/18/98.
Sakai Y, Sakurai K. Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n. In Ohta K, Pei D, editors, Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer Verlag. 1998. p. 80-94. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
Sakai, Yasuyuki ; Sakurai, Kouichi. / Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n. Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. editor / Kazuo Ohta ; Dingyi Pei. Springer Verlag, 1998. pp. 80-94 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{ac065fa94af64c9e8430e6b26c53e9dc,
title = "Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n",
abstract = "We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.",
author = "Yasuyuki Sakai and Kouichi Sakurai",
year = "1998",
month = "1",
day = "1",
language = "English",
isbn = "3540651098",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "80--94",
editor = "Kazuo Ohta and Dingyi Pei",
booktitle = "Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings",
address = "Germany",

}

TY - GEN

T1 - Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n

AU - Sakai, Yasuyuki

AU - Sakurai, Kouichi

PY - 1998/1/1

Y1 - 1998/1/1

N2 - We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.

AB - We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.

UR - http://www.scopus.com/inward/record.url?scp=84947769343&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84947769343&partnerID=8YFLogxK

M3 - Conference contribution

AN - SCOPUS:84947769343

SN - 3540651098

SN - 9783540651093

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 80

EP - 94

BT - Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings

A2 - Ohta, Kazuo

A2 - Pei, Dingyi

PB - Springer Verlag

ER -