<--- Back to Details
First PageDocument Content
Elliptic curves / Algebraic curves / Analytic number theory / Algebraic surfaces / Supersingular elliptic curve / Elliptic curve / Isogeny / Abelian variety / Supersingular variety / Supersingular isogeny key exchange / Elliptic curve cryptography
Date: 2011-09-30 12:40:05
Elliptic curves
Algebraic curves
Analytic number theory
Algebraic surfaces
Supersingular elliptic curve
Elliptic curve
Isogeny
Abelian variety
Supersingular variety
Supersingular isogeny key exchange
Elliptic curve cryptography

Isogenies and endomorphism rings of elliptic curves ECC Summer School Damien Robert Microsoft ResearchNancy)

Add to Reading List

Source URL: ecc2011.loria.fr

Download Document from Source Website

File Size: 360,62 KB

Share Document on Facebook

Similar Documents

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

DocID: 1xUdt - View Document