Cryptographic aspects of real hyperelliptic curves

Michael J. Jacobson, Renate Scheidler, Andreas Stein
2010 Tatra Mountains Mathematical Publications  
In this paper, we give an overview of cryptographic applications using real hyperelliptic curves. We review previously proposed cryptographic protocols and discuss the infrastructure of a real hyperelliptic curve, the mathematical structure underlying all these protocols. We then describe recent improvements to infrastructure arithmetic, including explicit formulas for divisor arithmetic in genus 2, and advances in solving the infrastructure discrete logarithm problem, whose presumed
more » ... presumed intractability is the basis of security for the related cryptographic protocols.
doi:10.2478/v10127-010-0030-9 fatcat:2t7ft7jaizd2tkxmx3kwydnghq