-
Previous Article
Double circulant and quasi-twisted self-dual codes over $\mathbb F_5$ and $\mathbb F_7$
- AMC Home
- This Issue
-
Next Article
New upper bounds on codes via association schemes and linear programming
Cryptographic protocols on real hyperelliptic curves
1. | Department of Computer Science, University of Calgary, 2500 University Drive NW, Calgary, Alberta, Canada T2N 1N4, Canada |
2. | Department of Mathematics and Statistics, University of Calgary, 2500 University Drive NW, Calgary, Alberta, Canada T2N 1N4, Canada |
3. | Department of Mathematics, University of Wyoming, 1000 E. University Avenue, Laramie, WY 82071-3036, United States |
[1] |
Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 |
[2] |
Michael J. Jacobson, Jr., Monireh Rezai Rad, Renate Scheidler. Comparison of scalar multiplication on real hyperelliptic curves. Advances in Mathematics of Communications, 2014, 8 (4) : 389-406. doi: 10.3934/amc.2014.8.389 |
[3] |
Roberto Avanzi, Michael J. Jacobson, Jr., Renate Scheidler. Efficient reduction of large divisors on hyperelliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 261-279. doi: 10.3934/amc.2010.4.261 |
[4] |
Laurent Imbert, Michael J. Jacobson, Jr.. Empirical optimization of divisor arithmetic on hyperelliptic curves over $\mathbb{F}_{2^m}$. Advances in Mathematics of Communications, 2013, 7 (4) : 485-502. doi: 10.3934/amc.2013.7.485 |
[5] |
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281 |
[6] |
Roberto Avanzi, Nicolas Thériault. A filtering method for the hyperelliptic curve index calculus and its analysis. Advances in Mathematics of Communications, 2010, 4 (2) : 189-213. doi: 10.3934/amc.2010.4.189 |
[7] |
Stefan Erickson, Michael J. Jacobson, Jr., Andreas Stein. Explicit formulas for real hyperelliptic curves of genus 2 in affine representation. Advances in Mathematics of Communications, 2011, 5 (4) : 623-666. doi: 10.3934/amc.2011.5.623 |
[8] |
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 |
[9] |
Santos González, Llorenç Huguet, Consuelo Martínez, Hugo Villafañe. Discrete logarithm like problems and linear recurring sequences. Advances in Mathematics of Communications, 2013, 7 (2) : 187-195. doi: 10.3934/amc.2013.7.187 |
[10] |
Javier de la Cruz, Ricardo Villanueva-Polanco. Public key cryptography based on twisted dihedral group algebras. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022031 |
[11] |
J. Alberto Conejero, Enrique Hernández-Orallo, Pietro Manzoni, Marina Murillo-Arcila. A SIR-based model for contact-based messaging applications supported by permanent infrastructure. Discrete and Continuous Dynamical Systems - S, 2019, 12 (4&5) : 735-746. doi: 10.3934/dcdss.2019048 |
[12] |
Chun-Xiang Guo, Guo Qiang, Jin Mao-Zhu, Zhihan Lv. Dynamic systems based on preference graph and distance. Discrete and Continuous Dynamical Systems - S, 2015, 8 (6) : 1139-1154. doi: 10.3934/dcdss.2015.8.1139 |
[13] |
Cécilia Tarpau, Javier Cebeiro, Geneviève Rollet, Maï K. Nguyen, Laurent Dumas. Analytical reconstruction formula with efficient implementation for a modality of Compton scattering tomography with translational geometry. Inverse Problems and Imaging, , () : -. doi: 10.3934/ipi.2021075 |
[14] |
Zhiguo Xu, Weizhu Bao, Shaoyun Shi. Quantized vortex dynamics and interaction patterns in superconductivity based on the reduced dynamical law. Discrete and Continuous Dynamical Systems - B, 2018, 23 (6) : 2265-2297. doi: 10.3934/dcdsb.2018096 |
[15] |
Yan Cui, Yanfei Wang. Velocity modeling based on Rayleigh wave dispersion curve and sparse optimization inversion. Inverse Problems and Imaging, 2021, 15 (5) : 1121-1134. doi: 10.3934/ipi.2021031 |
[16] |
Ramprasad Sarkar, Mriganka Mandal, Sourav Mukhopadhyay. Quantum-safe identity-based broadcast encryption with provable security from multivariate cryptography. Advances in Mathematics of Communications, 2022 doi: 10.3934/amc.2022026 |
[17] |
Madhurima Mukhopadhyay, Palash Sarkar, Shashank Singh, Emmanuel Thomé. New discrete logarithm computation for the medium prime case using the function field sieve. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020119 |
[18] |
Leah Anderson, Thomas Pumir, Dimitrios Triantafyllos, Alexandre M. Bayen. Stability and implementation of a cycle-based max pressure controller for signalized traffic networks. Networks and Heterogeneous Media, 2018, 13 (2) : 241-260. doi: 10.3934/nhm.2018011 |
[19] |
Mehmet Duran Toksari, Emel Kizilkaya Aydogan, Berrin Atalay, Saziye Sari. Some scheduling problems with sum of logarithm processing times based learning effect and exponential past sequence dependent delivery times. Journal of Industrial and Management Optimization, 2022, 18 (3) : 1795-1807. doi: 10.3934/jimo.2021044 |
[20] |
Jitendra Kumar, Gurmeet Kaur, Evangelos Tsotsas. An accurate and efficient discrete formulation of aggregation population balance equation. Kinetic and Related Models, 2016, 9 (2) : 373-391. doi: 10.3934/krm.2016.9.373 |
2020 Impact Factor: 0.935
Tools
Metrics
Other articles
by authors
[Back to Top]