
Previous Article
A filtering method for the hyperelliptic curve index calculus and its analysis
 AMC Home
 This Issue

Next Article
Explicit 2power torsion of genus 2 curves over finite fields
Efficient implementation of elliptic curve cryptography in wireless sensors
1.  University of Campinas (UNICAMP), Campinas  SP, CEP 13083970, Brazil, Brazil, Brazil, Brazil 
[1] 
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281305. doi: 10.3934/amc.2010.4.281 
[2] 
Haibo Yi. Efficient systolic multiplications in composite fields for cryptographic systems. Discrete & Continuous Dynamical Systems  S, 2019, 12 (4&5) : 11351145. doi: 10.3934/dcdss.2019078 
[3] 
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281286. doi: 10.3934/amc.2007.1.281 
[4] 
Huaiyu Jian, Hongjie Ju, Wei Sun. Traveling fronts of curve flow with external force field. Communications on Pure & Applied Analysis, 2010, 9 (4) : 975986. doi: 10.3934/cpaa.2010.9.975 
[5] 
Koray Karabina, Berkant Ustaoglu. Invalidcurve attacks on (hyper)elliptic curve cryptosystems. Advances in Mathematics of Communications, 2010, 4 (3) : 307321. doi: 10.3934/amc.2010.4.307 
[6] 
Kwang Ho Kim, Junyop Choe, Song Yun Kim, Namsu Kim, Sekung Hong. Speeding up regular elliptic curve scalar multiplication without precomputation. Advances in Mathematics of Communications, 2020, 14 (4) : 703726. doi: 10.3934/amc.2020090 
[7] 
Anton Stolbunov. Constructing publickey cryptographic schemes based on class group action on a set of isogenous elliptic curves. Advances in Mathematics of Communications, 2010, 4 (2) : 215235. doi: 10.3934/amc.2010.4.215 
[8] 
Xuefei He, Kun Wang, Liwei Xu. Efficient finite difference methods for the nonlinear Helmholtz equation in Kerr medium. Electronic Research Archive, , () : . doi: 10.3934/era.2020079 
[9] 
Grégory Berhuy, Jean Fasel, Odile Garotta. Rank weights for arbitrary finite field extensions. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020083 
[10] 
Xiaowei Pang, Haiming Song, Xiaoshen Wang, Jiachuan Zhang. Efficient numerical methods for elliptic optimal control problems with random coefficient. Electronic Research Archive, 2020, 28 (2) : 10011022. doi: 10.3934/era.2020053 
[11] 
Steven D. Galbraith, Ping Wang, Fangguo Zhang. Computing elliptic curve discrete logarithms with improved babystep giantstep algorithm. Advances in Mathematics of Communications, 2017, 11 (3) : 453469. doi: 10.3934/amc.2017038 
[12] 
Richard Hofer, Arne Winterhof. On the arithmetic autocorrelation of the Legendre sequence. Advances in Mathematics of Communications, 2017, 11 (1) : 237244. doi: 10.3934/amc.2017015 
[13] 
Andrew P. Sage. Risk in system of systems engineering and management. Journal of Industrial & Management Optimization, 2008, 4 (3) : 477487. doi: 10.3934/jimo.2008.4.477 
[14] 
Akbar Mahmoodi Rishakani, Seyed Mojtaba Dehnavi, Mohmmadreza Mirzaee Shamsabad, Nasour Bagheri. Cryptographic properties of cyclic binary matrices. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020068 
[15] 
M. J. Jacobson, R. Scheidler, A. Stein. Cryptographic protocols on real hyperelliptic curves. Advances in Mathematics of Communications, 2007, 1 (2) : 197221. doi: 10.3934/amc.2007.1.197 
[16] 
Angela Aguglia, Antonio Cossidente, Giuseppe Marino, Francesco Pavese, Alessandro Siciliano. Orbit codes from forms on vector spaces over a finite field. Advances in Mathematics of Communications, 2020 doi: 10.3934/amc.2020105 
[17] 
Tanja Eisner, Rainer Nagel. Arithmetic progressions  an operator theoretic view. Discrete & Continuous Dynamical Systems  S, 2013, 6 (3) : 657667. doi: 10.3934/dcdss.2013.6.657 
[18] 
Mehdi Pourbarat. On the arithmetic difference of middle Cantor sets. Discrete & Continuous Dynamical Systems  A, 2018, 38 (9) : 42594278. doi: 10.3934/dcds.2018186 
[19] 
Eitan Altman. Bioinspired paradigms in network engineering games. Journal of Dynamics & Games, 2014, 1 (1) : 115. doi: 10.3934/jdg.2014.1.1 
[20] 
Ruinian Li, Yinhao Xiao, Cheng Zhang, Tianyi Song, Chunqiang Hu. Cryptographic algorithms for privacypreserving online applications. Mathematical Foundations of Computing, 2018, 1 (4) : 311330. doi: 10.3934/mfc.2018015 
2019 Impact Factor: 0.734
Tools
Metrics
Other articles
by authors
[Back to Top]