Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves

D Moody, D Shumow - Mathematics of Computation, 2016 - ams.org
Isogenies are the morphisms between elliptic curves and are, accordingly, a topic of interest
in the subject. As such, they have been well studied, and have been used in several …

Inverse Lax–Wendroff procedure for numerical boundary conditions of hyperbolic equations: survey and new developments

S Tan, CW Shu - Advances in applied mathematics, modeling, and …, 2013 - Springer
In this paper, we give a survey and discuss new developments and computational results for
a high order accurate numerical boundary condition based on finite difference methods for …

On Kummer lines with full rational 2-torsion and their usage in cryptography

H Hisil, J Renes - ACM Transactions on Mathematical Software (TOMS), 2019 - dl.acm.org
A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines
in genus 1, by observing that their SIMD-friendly arithmetic is competitive with the status quo …

Faster Complete Addition Laws for Montgomery Curves

RR Farashahi, M Fadavi… - IACR Transactions on …, 2024 - icscm.ub.rub.de
An addition law for an elliptic curve is complete if it is defined for all possible pairs of input
points on the elliptic curve. In Elliptic Curve Cryptography (ECC), a complete addition law …

Families of elliptic curves with rational 3-torsion

D Moody, H Wu - Journal of Mathematical Cryptology, 2012 - degruyter.com
In this paper we look at three families of elliptic curves with rational 3-torsion over a finite
field. These families include Hessian curves, twisted Hessian curves, and a new family we …

On the number of distinct Legendre, Jacobi and Hessian curves

RR Farashahi - arxiv preprint arxiv:1112.5714, 2011 - arxiv.org
arxiv:1112.5714v1 [math.AG] 24 Dec 2011 On the Number of Distinct Legendre, Jacobi and
Hessian Curves Page 1 arxiv:1112.5714v1 [math.AG] 24 Dec 2011 On the Number of Distinct …

Elliptic curves over finite fields: Number theoretic and cryptographic aspects

IE Shparlinski - Advances in Applied Mathematics, Modeling, and …, 2013 - Springer
We present a collection of several natural questions about elliptic curves, mostly over finite
fields, that have led to some interesting number theoretic questions and whose solutions …

[ΒΙΒΛΙΟ][B] Security on the Line: Modern Curve-based Cryptography

JR Renes - 2019 - repository.ubn.ru.nl
The main theme (and title) of this thesis is “modern curve-based cryptography”. Indeed, the
history of cryptography is long and leads back to the early Egyptians and Romans. Its …

Batch Verification of Elliptic Curve Digital Signatures

M Wesolowski - 2015 - library-archives.canada.ca
This thesis investigates the efficiency of batching the verification of elliptic curve signatures.
The first signature scheme considered is a modification of ECDSA proposed by Antipa et …

Intelligent Security Control Based on the New Criterion of Edwards and Montgomery Curves, Isogenous of These Curves Supersingularity

R Skuratovskii, A Williams, Y Osadchyy - Proceedings of International …, 2022 - Springer
It is well known supersingular curves due to pairing of Weil and pairing of Tate are used in
identity-based cryptosystems so we find criterion of supersingularity of Montgomery and …