Secure hyperelliptic cryptosystems and their performance

Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka

Research output: Chapter in Book/Report/Conference proceedingConference contribution

20 Citations (Scopus)

Abstract

We investigate the discrete logarithm problem over jacobian varieties of hypereUiptic curves suitable for public-key cryptosysterns, and clarify practical advantages of hyperelliptic cryptosystems compared to the elliptic cryptosystems and to RSA. We focus on the curves defined over the ground field of characteristic 2, and we present hyperelliptic cryptosystems from the jacobian associated with curves[Formula Presented]of genus g=3 and 11, which are secure against the known attacks. We further discuss the efficiency in implementation of such secure hyperelliptic cryptosystems.

Original languageEnglish
Title of host publicationPublic Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings
EditorsYuliang Zheng, Hideki Imai
PublisherSpringer Verlag
Pages164-181
Number of pages18
ISBN (Print)3540646930, 9783540646938
DOIs
Publication statusPublished - Jan 1 1998
Event1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998 - Pacifico Yokohama, Japan
Duration: Feb 5 1998Feb 6 1998

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume1431
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998
CountryJapan
CityPacifico Yokohama
Period2/5/982/6/98

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint Dive into the research topics of 'Secure hyperelliptic cryptosystems and their performance'. Together they form a unique fingerprint.

  • Cite this

    Sakai, Y., Sakurai, K., & Ishizuka, H. (1998). Secure hyperelliptic cryptosystems and their performance. In Y. Zheng, & H. Imai (Eds.), Public Key Cryptography - 1st International Workshop on Practice and Theory in Public Key Cryptography, PKC 1998, Proceedings (pp. 164-181). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 1431). Springer Verlag. https://doi.org/10.1007/BFb0054023