Paper 2013/487
Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the GHS attack under an Isogeny Condition
Tsutomu Iijima, Fumiyuki Momose, and Jinhui Chao
Abstract
The GHS attack is known to map the discrete logarithm problem(DLP) in the Jacobian of a curve
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint. MINOR revision.
- Keywords
- Weil descent attackGHS attackElliptic curve cryptosystemsHyperelliptic curve cryptosystemsIndex calculusGalois representation
- Contact author(s)
- tiijima @ jt3 so-net ne jp
- History
- 2015-02-18: last of 3 revisions
- 2013-08-14: received
- See all versions
- Short URL
- https://ia.cr/2013/487
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2013/487, author = {Tsutomu Iijima and Fumiyuki Momose and Jinhui Chao}, title = {Classification of Elliptic/hyperelliptic Curves with Weak Coverings against the {GHS} attack under an Isogeny Condition}, howpublished = {Cryptology {ePrint} Archive, Paper 2013/487}, year = {2013}, url = {https://eprint.iacr.org/2013/487} }