Fast cryptography in genus 2

Loading...
Publication Logo

Date

2013

Authors

Joppe W. Bos
Craig Costello
Hüseyin Hişil
Kristin Estella Lauter

Journal Title

Journal ISSN

Volume Title

Publisher

Springer-Verlag Berlin

Open Access Color

BRONZE

Green Open Access

Yes

OpenAIRE Downloads

OpenAIRE Views

Publicly Funded

No
Impulse
Top 10%
Influence
Top 10%
Popularity
Top 10%

Research Projects

Journal Issue

Abstract

In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared to the standardized genus 1 curves or elliptic curves arithmetic on genus 2 curves is typically more involved but allows us to work with moduli of half the size. We give a taxonomy of the best known techniques to realize genus 2 based cryptography which includes fast formulas on the Kummer surface and efficient 4-dimensional GLV decompositions. By studying different modular arithmetic approaches on these curves we present a range of genus 2 implementations. On a single core of an Intel Core i7-3520M (Ivy Bridge) our implementation on the Kummer surface breaks the 120 thousand cycle barrier which sets a new software speed record at the 128-bit security level for constant-time scalar multiplications compared to all previous genus 1 and genus 2 implementations. © 2013 International Association for Cryptologic Research. © 2013 Elsevier B.V. All rights reserved.

Description

Keywords

Elliptic Curve, Genus 2 Curves, Intel Core I7, Kummer Surface, Modular Arithmetic, Scalar Multiplication, Security Level, Artificial Intelligence, Computer Science, Public Key Cryptography, Elliptic curve, Genus 2 curves, Intel core i7, Kummer surface, Modular arithmetic, Scalar multiplication, Security level, Artificial intelligence, Computer science, Public key cryptography, Cryptography, 500, Applications to coding theory and cryptography of arithmetic geometry, 510

Fields of Science

0101 mathematics, 01 natural sciences

Citation

WoS Q

Scopus Q

OpenCitations Logo
OpenCitations Citation Count
47

Source

32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2013

Volume

29

Issue

Start Page

28

End Page

60
PlumX Metrics
Citations

CrossRef : 18

Scopus : 57

Captures

Mendeley Readers : 34

SCOPUS™ Citations

57

checked on Apr 10, 2026

Web of Science™ Citations

51

checked on Apr 10, 2026

Google Scholar Logo
Google Scholar™
OpenAlex Logo
OpenAlex FWCI
20.9698

Sustainable Development Goals

SDG data is not available