Our main result is an algebraic attack which shows that it is not secure to disguise the torus $T_2$. We also show that some methods for disguising an elliptic curve are not secure. Finally, we present a method to disguise an elliptic curve which seems to resist our algebraic attack.
Category / Keywords: public-key cryptography / Elliptic curves, algebraic tori, weil descent Date: received 20 Jul 2006 Contact author: Steven Galbraith at rhul ac uk Available formats: PDF | BibTeX Citation Version: 20060721:073558 (All versions of this report) Discussion forum: Show discussion | Start new discussion