Constructive and destructive facets of weil descent on elliptic curves

155Citations
Citations of this article
48Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

In this paper we look in detail at the curves which arise in the method of Galbraith and Smart for producing curves in the Weil restriction of an elliptic curve over a finite field of characteristic 2 of composite degree. We explain how this method can be used to construct hyperelliptic cryptosystems which could be as secure as cryptosystems based on the original elliptic curve. On the other hand, we show that the same technique may provide a way of attacking the original elliptic curve cryptosystem using recent advances in the study of the discrete logarithm problem on hyperelliptic curves. We examine the resulting higher genus curves in some detail and propose an additional check on elliptic curve systems defined over fields of characteristic 2 so as to make them immune from the methods in this paper. © 2002 International Association for Cryptologic Research.

References Powered by Scopus

A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves

413Citations
N/AReaders
Get full text

Elliptic curves over finite fields and the computation of square roots mod p

377Citations
N/AReaders
Get full text

Computing in the jacobian of a hyperelliptic curve

281Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Short signatures from the weil pairing

1123Citations
N/AReaders
Get full text

Mathematics of public key cryptography

257Citations
N/AReaders
Get full text

Elliptic curve cryptosystems in the presence of permanent and transient faults

115Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Gaudry, P., Hess, F., & Smart, N. P. (2002). Constructive and destructive facets of weil descent on elliptic curves. Journal of Cryptology, 15(1), 19–46. https://doi.org/10.1007/s00145-001-0011-x

Readers over time

‘09‘10‘11‘12‘13‘14‘15‘16‘17‘18‘19‘20‘21‘23‘24036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 26

65%

Professor / Associate Prof. 7

18%

Researcher 5

13%

Lecturer / Post doc 2

5%

Readers' Discipline

Tooltip

Computer Science 25

61%

Mathematics 11

27%

Engineering 3

7%

Physics and Astronomy 2

5%

Article Metrics

Tooltip
Mentions
References: 1

Save time finding and organizing research with Mendeley

Sign up for free
0