A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Extending the GHS Weil Descent Attack
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Short Signatures from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Self-Blindable Credential Certificates from the Weil Pairing
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Supersingular Curves in Cryptography
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
ANTS-I Proceedings of the First International Symposium on Algorithmic Number Theory
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
Ideals, Varieties, and Algorithms: An Introduction to Computational Algebraic Geometry and Commutative Algebra, 3/e (Undergraduate Texts in Mathematics)
The Tate pairing and the discrete logarithm applied to elliptic curve cryptosystems
IEEE Transactions on Information Theory
Securing IPv6 neighbor and router discovery
WiSE '02 Proceedings of the 1st ACM workshop on Wireless security
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
The dual receiver cryptosystem and its applications
Proceedings of the 11th ACM conference on Computer and communications security
Efficient pairing computation on supersingular Abelian varieties
Designs, Codes and Cryptography
A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y2 = x5 + ax
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Applications to cryptography of twisting commutative algebraic groups
Discrete Applied Mathematics
On the Security of Pairing-Friendly Abelian Varieties over Non-prime Fields
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
Abelian varieties with prescribed embedding degree
ANTS-VIII'08 Proceedings of the 8th international conference on Algorithmic number theory
Compact hardware for computing the tate pairing over 128-bit-security supersingular curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Efficient doubling on genus 3 curves over binary fields
CT-RSA'06 Proceedings of the 2006 The Cryptographers' Track at the RSA conference on Topics in Cryptology
Practical cryptography in high dimensional tori
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
The function field sieve in the medium prime case
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
Short traceable signatures based on bilinear pairings
IWSEC'06 Proceedings of the 1st international conference on Security
Pairing-Friendly elliptic curves of prime order
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Ordinary abelian varieties having small embedding degree
Finite Fields and Their Applications
Algebraic curves and cryptography
Finite Fields and Their Applications
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Zeta function and cryptographic exponent of supersingular curves of genus 2
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Constructing pairing-friendly genus 2 curves with ordinary Jacobians
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
On the minimal embedding field
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
Generating pairing-friendly parameters for the CM construction of genus 2 curves over prime fields
Designs, Codes and Cryptography
Hi-index | 0.00 |
For certain security applications, including identity based encryption and short signature schemes, it is useful to have abelian varieties with security parameters that are neither too small nor too large. Supersingular abelian varieties are natural candidates for these applications. This paper determines exactly which values can occur as the security parameters of supersingular abelian varieties (in terms of the dimension of the abelian variety and the size of the finite field), and gives constructions of supersingular abelian varieties that are optimal for use in cryptography.