Isogeny cordillera algorithm to obtain cryptographically good elliptic curves

ACSW Frontiers(2007)

引用 25|浏览2
暂无评分
摘要
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l-cordilleras.
更多
查看译文
关键词
different volcano,elliptic curve,elliptic curve discrete logarithm,elliptic curve cryptosystems,isogeny cordillera algorithm,successive chain,computationally unfeasible,different l-cordilleras,cryptographically good elliptic curve,elliptic curves,cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要