Hüseyin HişilJoost Renes2025-10-06201915577295, 009835000098-35001557-729510.1145/3361680https://www.scopus.com/inward/record.uri?eid=2-s2.0-85076712395&doi=10.1145%2F3361680&partnerID=40&md5=79bd0131ea0d8dc7a65dc3720f6df844https://gcris.yasar.edu.tr/handle/123456789/9337A paper by Karati and Sarkar at Asiacrypt'17 has pointed out the potential for Kummer lines in genus 1 by observing that their SIMD-friendly arithmetic is competitive with the status quo. A more recent preprint explores the connection with (twisted) Edwards curves. In this article we extend this work and significantly simplify the treatment of Karati and Sarkar. We show that their Kummer line is the x-line of a Montgomery curve translated by a point of order two and exhibit a natural isomorphism to the y-line of a twisted Edwards curve. Moreover we show that the Kummer line presented by Gaudry and Lubicz can be obtained via the action of a point of order two on the y-line of an Edwards curve. The maps connecting these curves and lines are all very simple. As a result a cryptographic implementation can use the arithmetic that is optimal for its instruction set at negligible cost. © 2019 Elsevier B.V. All rights reserved.EnglishDigital Signatures, Edwards Curves, Kummer Lines, Montgomery Curves, Montgomery Ladder, Computer Software, Electronic Document Identification Systems, Software Engineering, Cryptographic Implementation, Edwards Curves, Instruction Set, Kummer Lines, Montgomery, Status Quo, CryptographyComputer software, Electronic document identification systems, Software engineering, Cryptographic implementation, Edwards curves, Instruction set, Kummer lines, Montgomery, Status quo, CryptographyOn Kummer lines with full rational 2-torsion and their usage in cryptographyArticle