Isogeny cordillera algorithm to obtain cryptographically good elliptic curves

  • Authors:
  • J. Miret;D. Sadornil;J. Tena;R. Tomàs;M. Valls

  • Affiliations:
  • Universitat de Lleida (Spain);Universidad de Salamanca (Spain);Universidad de Valladolid (Spain);Universitat de Lleida (Spain);Universitat de Lleida (Spain)

  • Venue:
  • ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem (ECDLP). Such a problem turns out to be computationally unfeasible when elliptic curves are suitably chosen. This paper provides an algorithm to obtain cryptographically good elliptic curves from a given one. The core of such a procedure lies on the usage of successive chains of isogenies, visiting different volcanoes of isogenies which are located in different l-cordilleras.