2002
DOI: 10.1090/s0025-5718-02-01422-9
|View full text |Cite
|
Sign up to set email alerts
|

Constructing hyperelliptic curves of genus 2 suitable for cryptography

Abstract: Abstract. In this article we show how to generalize the CM-method for elliptic curves to genus two. We describe the algorithm in detail and discuss the results of our implementation.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
53
0
3

Year Published

2004
2004
2017
2017

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 54 publications
(56 citation statements)
references
References 20 publications
(21 reference statements)
0
53
0
3
Order By: Relevance
“…⊓ ⊔ Depending on p and O K , there are 2 or 4 possibilities for the group order #Jac(C, F q ) [24] [5]. However, for a demonstration purpose, in the algorithm above we are only interested in curves C whose Jacobian has exact group order given by…”
Section: Proof It Is Clear That Ifmentioning
confidence: 99%
See 3 more Smart Citations
“…⊓ ⊔ Depending on p and O K , there are 2 or 4 possibilities for the group order #Jac(C, F q ) [24] [5]. However, for a demonstration purpose, in the algorithm above we are only interested in curves C whose Jacobian has exact group order given by…”
Section: Proof It Is Clear That Ifmentioning
confidence: 99%
“…An alternative to point counting is to use the genus 2 Complex Multiplication (CM) algorithm ( [24]) to construct curves with a given number of points on its Jacobian. Like the case of the elliptic curve CM method, the genus 2 CM method is very efficient once the class polynomials of the CM field are computed.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The class polynomials for K can be found in the preprint version of [13]. We used the roots of the class polynomials mod q to construct curves over F q with CM by O K .…”
Section: (645 Bits)mentioning
confidence: 99%