Jacobian coordinates on genus 2 curves
Loading...

Date
2014
Authors
Journal Title
Journal ISSN
Volume Title
Publisher
Springer Verlag
Open Access Color
BRONZE
Green Open Access
Yes
OpenAIRE Downloads
OpenAIRE Views
Publicly Funded
No
Abstract
This paper presents a new projective coordinate system and new explicit algorithms which together boost the speed of arithmetic in the divisor class group of genus 2 curves. The proposed formulas generalise the use of Jacobian coordinates on elliptic curves and their application improves the speed of performing cryptographic scalar multiplications in Jacobians of genus 2 curves over prime fields by an approximate factor of 1.25x. For example on a single core of an Intel Core i7-3770M (Ivy Bridge) we show that replacing the previous best formulas with our new set improves the cost of generic scalar multiplications from 243000 to 195000 cycles and drops the cost of specialised GLV-style scalar multiplications from 166000 to 129000 cycles. © 2020 Elsevier B.V. All rights reserved.
Description
Keywords
Explicit Formulas, Genus 2, Hyperelliptic Curves, Jacobian Coordinates, Scalar Multiplication, Geometry, Security Of Data, Explicit Formula, Genus 2, Hyper-elliptic Curves, Jacobian Coordinate, Scalar Multiplication, Cryptography, Geometry, Security of data, Explicit formula, Genus 2, Hyper-elliptic curves, Jacobian coordinate, Scalar multiplication, Cryptography, Genus 2, Scalar Multiplication, Explicit Formulas, Hyperelliptic Curves, Jacobian Coordinates, Computational aspects of algebraic curves, Jacobian coordinates, genus 2, Applications to coding theory and cryptography of arithmetic geometry, Hyperelliptic curves, 620, 510, hyperelliptic curves, explicit formulas, Explicit formulas, Cryptography, scalar multiplication, Scalar multiplication, Genus 2
Fields of Science
0102 computer and information sciences, 01 natural sciences, 0101 mathematics
Citation
WoS Q
Scopus Q

OpenCitations Citation Count
11
Source
20th International Conference on the Theory and Application of Cryptology and Information Security ASIACRYPT 2014
Volume
30
Issue
Start Page
572
End Page
600
PlumX Metrics
Citations
CrossRef : 4
Scopus : 10
Captures
Mendeley Readers : 24
SCOPUS™ Citations
10
checked on Apr 09, 2026
Web of Science™ Citations
10
checked on Apr 09, 2026
Google Scholar™


