TY - GEN
T1 - Design of hyperelliptic cryptosystems in small characteristic and a software implementation over F2n
AU - Sakai, Yasuyuki
AU - Sakurai, Kouichi
N1 - Publisher Copyright:
© Springer-Verlag Berlin Heidelberg 1998.
PY - 1998
Y1 - 1998
N2 - We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.
AB - We investigate the discrete logarithm problem over jacobians of hyperelliptic curves suitable for public-key cryptosystems. We focus on the case when the definition field has small characteristic 2, 3, 5 and 7, then we present hyperelliptic cryptosystems that resist against all known attacks. We further implement our designed hyperelliptic cryptosystems over finite fields F2n in software on Alpha and Pentium-II computers. Our results indicate that if we choose curves carefully, hyperelliptic cryp-tosystems do have practical performance.
UR - http://www.scopus.com/inward/record.url?scp=84947769343&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84947769343&partnerID=8YFLogxK
U2 - 10.1007/3-540-49649-1_8
DO - 10.1007/3-540-49649-1_8
M3 - Conference contribution
AN - SCOPUS:84947769343
SN - 3540651098
SN - 9783540651093
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 80
EP - 94
BT - Advances in Cryptology – ASIACRYPT 1998 - International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
A2 - Ohta, Kazuo
A2 - Pei, Dingyi
PB - Springer Verlag
T2 - 4th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 1998
Y2 - 18 October 1998 through 22 October 1998
ER -