Fast cryptography in genus 2

dc.contributor.author Joppe W. Bos
dc.contributor.author Craig Costello
dc.contributor.author Hüseyin Hişil
dc.contributor.author Kristin Estella Lauter
dc.contributor.author Bos, Joppe W.
dc.contributor.author Lauter, Kristin
dc.contributor.author Costello, Craig
dc.contributor.author Hisil, Huseyin
dc.date.accessioned 2025-10-06T17:52:45Z
dc.date.issued 2013
dc.description.abstract In this paper we highlight the benefits of using genus 2 curves in public-key cryptography. Compared to the standardized genus 1 curves or elliptic curves arithmetic on genus 2 curves is typically more involved but allows us to work with moduli of half the size. We give a taxonomy of the best known techniques to realize genus 2 based cryptography which includes fast formulas on the Kummer surface and efficient 4-dimensional GLV decompositions. By studying different modular arithmetic approaches on these curves we present a range of genus 2 implementations. On a single core of an Intel Core i7-3520M (Ivy Bridge) our implementation on the Kummer surface breaks the 120 thousand cycle barrier which sets a new software speed record at the 128-bit security level for constant-time scalar multiplications compared to all previous genus 1 and genus 2 implementations. © 2013 International Association for Cryptologic Research. © 2013 Elsevier B.V. All rights reserved.
dc.description.sponsorship International Association for Cryptologic Research (IACR)
dc.identifier.doi 10.1007/978-3-642-38348-9_12
dc.identifier.isbn 9789819698936, 9789819698042, 9789819698110, 9789819698905, 9789819512324, 9783032026019, 9783032008909, 9783031915802, 9789819698141, 9783031984136
dc.identifier.isbn 9783642383489
dc.identifier.isbn 9783642383472
dc.identifier.issn 16113349, 03029743
dc.identifier.issn 0933-2790
dc.identifier.issn 1432-1378
dc.identifier.issn 1611-3349
dc.identifier.issn 0302-9743
dc.identifier.scopus 2-s2.0-84883437294
dc.identifier.uri https://www.scopus.com/inward/record.uri?eid=2-s2.0-84883437294&doi=10.1007%2F978-3-642-38348-9_12&partnerID=40&md5=8240c0ca6e2c8317ac26c074231a27ea
dc.identifier.uri https://gcris.yasar.edu.tr/handle/123456789/10080
dc.identifier.uri https://doi.org/10.1007/978-3-642-38348-9_12
dc.language.iso English
dc.publisher Springer-Verlag Berlin
dc.relation.ispartof 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques EUROCRYPT 2013
dc.relation.ispartofseries Lecture Notes in Computer Science
dc.rights info:eu-repo/semantics/openAccess
dc.source Lecture Notes in Computer Science
dc.subject Elliptic Curve, Genus 2 Curves, Intel Core I7, Kummer Surface, Modular Arithmetic, Scalar Multiplication, Security Level, Artificial Intelligence, Computer Science, Public Key Cryptography
dc.subject Elliptic curve, Genus 2 curves, Intel core i7, Kummer surface, Modular arithmetic, Scalar multiplication, Security level, Artificial intelligence, Computer science, Public key cryptography
dc.title Fast cryptography in genus 2
dc.type Conference Object
dspace.entity.type Publication
gdc.author.id Costello, Craig/0000-0001-5423-7714
gdc.author.id Bos, Joppe/0000-0003-1010-8157
gdc.author.id HISIL, HUSEYIN/0000-0002-1019-2187
gdc.author.scopusid 34869404400
gdc.author.scopusid 13408968300
gdc.author.scopusid 35117526000
gdc.author.scopusid 6603558095
gdc.author.wosid HISIL, HUSEYIN/L-9151-2013
gdc.bip.impulseclass C4
gdc.bip.influenceclass C4
gdc.bip.popularityclass C4
gdc.coar.type text::conference output
gdc.collaboration.industrial true
gdc.description.department
gdc.description.departmenttemp [Bos, Joppe W.; Costello, Craig; Lauter, Kristin] Microsoft Res, Redmond, WA USA; [Hisil, Huseyin] Yasar Univ, Izmir, Turkey; [Costello, Craig] Tech Univ Eindhoven, Dept Math & Comp Sci, Eindhoven, Netherlands
gdc.description.endpage 60
gdc.description.publicationcategory Konferans Öğesi - Uluslararası - Kurum Öğretim Elemanı
gdc.description.startpage 28
gdc.description.volume 29
gdc.description.woscitationindex Conference Proceedings Citation Index - Science
gdc.identifier.openalex W2192787805
gdc.identifier.wos WOS:000371258000012
gdc.index.type Scopus
gdc.index.type WoS
gdc.oaire.accesstype BRONZE
gdc.oaire.diamondjournal false
gdc.oaire.impulse 22.0
gdc.oaire.influence 6.419325E-9
gdc.oaire.isgreen true
gdc.oaire.keywords Cryptography
gdc.oaire.keywords 500
gdc.oaire.keywords Applications to coding theory and cryptography of arithmetic geometry
gdc.oaire.keywords 510
gdc.oaire.popularity 1.4581386E-8
gdc.oaire.publicfunded false
gdc.oaire.sciencefields 0101 mathematics
gdc.oaire.sciencefields 01 natural sciences
gdc.openalex.collaboration International
gdc.openalex.fwci 20.9698
gdc.openalex.normalizedpercentile 1.0
gdc.openalex.toppercent TOP 1%
gdc.opencitations.count 47
gdc.plumx.crossrefcites 18
gdc.plumx.mendeley 34
gdc.plumx.scopuscites 57
gdc.scopus.citedcount 57
gdc.wos.citedcount 51
oaire.citation.endPage 210
oaire.citation.startPage 194
person.identifier.scopus-author-id Bos- Joppe W. (35117526000), Costello- Craig (34869404400), Hişil- Hüseyin (13408968300), Lauter- Kristin Estella (6603558095)
publicationvolume.volumeNumber 7881 LNCS
relation.isOrgUnitOfPublication ac5ddece-c76d-476d-ab30-e4d3029dee37
relation.isOrgUnitOfPublication.latestForDiscovery ac5ddece-c76d-476d-ab30-e4d3029dee37

Files