%0 Journal Article %T Selection of secure hyperelliptic curves of g =2 based on a subfield
Selection of Secure Hyperelliptic Curves of g = 2 Based on a Subfield %A Zhang Fangguo %A Zhang Futai %A Wang Yumin %A
张方国 %A 张福泰 %A 王育民 %J 计算机科学技术学报 %D 2002 %I %X In the implementation of hyperelliptic curve cryptosystems, a siginificant step is the selection of secure hyperelliptic curves on which the Jacobian is constructed. In this paper, we discuss the hyperelliptic curves of g=2 such as v2 uv=f and v2 v=f(u) defined on GF(2r). The curves defined on GF(4) and GF(8) are expanded to the curves defined on GF(4)k and GF(8)t respectively, where 38 %K hyperelliptic curve cryptosystems %K Jacobian %K subfield
保密通信系统 %K 安全双曲线选择 %K ECC %K 曲线方格 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=F57FEF5FAEE544283F43708D560ABF1B&aid=478E675950B1B35CE03E12DA24D6A292&yid=C3ACC247184A22C1&vid=BCA2697F357F2001&iid=B31275AF3241DB2D&sid=2B25C5E62F83A049&eid=2B25C5E62F83A049&journal_id=1000-9000&journal_name=计算机科学技术学报&referenced_num=0&reference_num=12