Journal of Cryptology
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Counting Points on Hyperelliptic Curves over Finite Fields
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
High Performance Arithmetic for special Hyperelliptic Curve Cryptosystems of Genus Two
ITCC '04 Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04) Volume 2 - Volume 2
Approximation through multicommodity flow
SFCS '90 Proceedings of the 31st Annual Symposium on Foundations of Computer Science
Efficient doubling on genus two curves over binary fields
SAC'04 Proceedings of the 11th international conference on Selected Areas in Cryptography
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Handbook of Elliptic and Hyperelliptic Curve Cryptography, Second Edition
Hi-index | 0.00 |
Elliptic (ECC)and hyperelliptic curve cryptosystems (HECC) have emerged as cryptosystemsfor small hand-held andmobile devices.Extensive research has been carried out for their secure and efficient implementation on these devices. These devices come with very low amount of resources, efficient memory management is an important issue in all such implementations. HECC arithmetic is now generally performed using so called explicit formulas. The main goal of these formulas is to reduce the number of finite field operations (multiplications and squarings). On the other hand, reducing the memory requirement is also important.To the best of our knowledge, the literature onHECCimplementation does not seriously consider this aspect.This is the firstwork to obtainmemory efficient versions of various explicit formulas appearing in the literature. In certain cases, we are also able to determine theminimummemory requirement and obtain a memory optimal implementation.We believe that these formulas will be extremely useful to designers of HECC. Our basic technique is essentially an exhaustive search with heuristic strategies for improving the run-time.