2016
DOI: 10.1016/j.ffa.2016.01.008
|View full text |Cite
|
Sign up to set email alerts
|

Isomorphism classes of Doche–Icart–Kohel curves over finite fields

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(3 citation statements)
references
References 2 publications
0
3
0
Order By: Relevance
“…The isomorphism classes of different curve models were first studied in [5]. In [9], Farashahi and Hosseini give explicit formulas for" the number of distinct elliptic curves over a finite field, up to isomorphism, in two families of curves introduced by C. Doche, T. Icart and D.R. Kohel.…”
Section: Original Research Articlementioning
confidence: 99%
“…The isomorphism classes of different curve models were first studied in [5]. In [9], Farashahi and Hosseini give explicit formulas for" the number of distinct elliptic curves over a finite field, up to isomorphism, in two families of curves introduced by C. Doche, T. Icart and D.R. Kohel.…”
Section: Original Research Articlementioning
confidence: 99%
“… Edwards curves: The Edwards model presents an alternative form of elliptic curves, which admits a complete and uniform group law [ 76 ]. Either d or c are two elements of , with not squared, the Edwards curves are defined by the following equation [ 76 ]: The Edwards and Montgomery curves have the advantage of being bi-rational to a Weierstrass curve; this property is important in cryptographic applications, such as IoT [ 77 ]. For example, the calculation of the point exponentiation operation in an Edwards curve is 1.5 times more efficient than that performed in a Weierstrass curve [ 78 ].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%
“…The Edwards and Montgomery curves have the advantage of being bi-rational to a Weierstrass curve; this property is important in cryptographic applications, such as IoT [ 77 ]. For example, the calculation of the point exponentiation operation in an Edwards curve is 1.5 times more efficient than that performed in a Weierstrass curve [ 78 ].…”
Section: Elliptic Curve Cryptographymentioning
confidence: 99%