Hyperelliptic curve

Results: 124



#Item
11This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

This is the Table of Contents of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC PressCRC Press has granted the following specific permi

Add to Reading List

Source URL: hyperelliptic.org

Language: English - Date: 2006-09-06 22:21:24
    12Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories  ECC Workshop 2013, 2013–09–17

    Indifferentiable Hashing to Elliptic and Hyperelliptic Curves Mehdi Tibouchi NTT Secure Platform Laboratories ECC Workshop 2013, 2013–09–17

    Add to Reading List

    Source URL: www.cosic.esat.kuleuven.be

    Language: English - Date: 2013-10-09 09:45:18
    13The Weierstrass subgroup of a curve has maximal rank. Martine Girard, David R. Kohel and Christophe Ritzenthaler ∗†‡  Abstract We show that the Weierstrass points of the generic curve of genus g over an algebraical

    The Weierstrass subgroup of a curve has maximal rank. Martine Girard, David R. Kohel and Christophe Ritzenthaler ∗†‡ Abstract We show that the Weierstrass points of the generic curve of genus g over an algebraical

    Add to Reading List

    Source URL: iml.univ-mrs.fr

    Language: English - Date: 2005-04-05 00:17:59
    14Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

    Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2014-08-03 16:15:38
    15Generalizing Vélu’s formulas and some applications Damien Robert1 1 LFANT Team, Inria Bordeaux Sud-Ouest

    Generalizing Vélu’s formulas and some applications Damien Robert1 1 LFANT Team, Inria Bordeaux Sud-Ouest

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2014-08-03 16:15:38
    16A Vélu-like formula for computing isogenies on Abelian Varieties Algorithmique et Arithmétique, avec applications à la cryptographie Romain Cosset1 , David Lubicz2,3 , Damien Robert1 1

    A Vélu-like formula for computing isogenies on Abelian Varieties Algorithmique et Arithmétique, avec applications à la cryptographie Romain Cosset1 , David Lubicz2,3 , Damien Robert1 1

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2013-11-15 16:58:00
    17SPECIAL DIVISORS OF LARGE DIMENSION ON CURVES WITH MANY POINTS OVER FINITE FIELDS J. F. VOLOCH Abstract. We prove a non-existence result for special divisors of large dimension on curves over finite fields with many poin

    SPECIAL DIVISORS OF LARGE DIMENSION ON CURVES WITH MANY POINTS OVER FINITE FIELDS J. F. VOLOCH Abstract. We prove a non-existence result for special divisors of large dimension on curves over finite fields with many poin

    Add to Reading List

    Source URL: www.ma.utexas.edu

    Language: English - Date: 2010-02-22 13:18:53
    18927  Documenta Math. A Combinatorial Interpretation for Schreyer’s Tetragonal Invariants

    927 Documenta Math. A Combinatorial Interpretation for Schreyer’s Tetragonal Invariants

    Add to Reading List

    Source URL: www.math.uiuc.edu

    Language: English - Date: 2015-09-30 08:03:53
    19MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

    MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Meeting, Saint-Louis, Sénégal Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2015-05-29 11:53:40
    20MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

    MACISA — Mathematics applied to cryptology and information security in Africa — LIRIMA Evaluation Seminar, Paris Tony Ezome, Damien Robert Équipe LFANT, Inria Bordeaux Sud-Ouest

    Add to Reading List

    Source URL: www.normalesup.org

    Language: English - Date: 2014-10-04 12:30:49