5 research outputs found

    Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2

    Get PDF
    We present an algorithm for computing the zeta function of an arbitrary hyperelliptic curve over a finite field Fq of characteristic 2, thereby extending the algorithm of Kedlaya for small odd characteristic. For a genus g hyperelliptic curve over n , the asymptotic running time of the algorithm is O(g ) and the space complexity is O(g )

    An extension of Kedlaya's algorithm to hyperelliptic curves in characteristic 2

    No full text
    We present an algorithm to compute the zeta function of an arbitrary hyperelliptic curve over a finite field F-q of characteristic 2, thereby extending the algorithm of Kedlaya for odd characteristic. Given a genus g hyperelliptic curve defined over F(2)n, the average-case time complexity is O(g(4+epsilon)n(3+epsilon)) and the average-case space complexity is O(g(3)n(3)), whereas the worst-case time and space complexities are O(g(5+epsilon)n(3+epsilon)) and O(g(4)n(3)), respectively.status: publishe

    An Extension of Kedlaya's Algorithm to Hyperelliptic Curves in Characteristic 2

    No full text
    We present an algorithm to compute the zeta function of an arbitrary hyperelliptic curve over a finite field F-q of characteristic 2, thereby extending the algorithm of Kedlaya for odd characteristic. Given a genus g hyperelliptic curve defined over F(2)n, the average-case time complexity is O(g(4+epsilon)n(3+epsilon)) and the average-case space complexity is O(g(3)n(3)), whereas the worst-case time and space complexities are O(g(5+epsilon)n(3+epsilon)) and O(g(4)n(3)), respectively.status: publishe

    Towards Efficient Hardware Implementation of Elliptic and Hyperelliptic Curve Cryptography

    Get PDF
    Implementation of elliptic and hyperelliptic curve cryptographic algorithms has been the focus of a great deal of recent research directed at increasing efficiency. Elliptic curve cryptography (ECC) was introduced independently by Koblitz and Miller in the 1980s. Hyperelliptic curve cryptography (HECC), a generalization of the elliptic curve case, allows a decreasing field size as the genus increases. The work presented in this thesis examines the problems created by limited area, power, and computation time when elliptic and hyperelliptic curves are integrated into constrained devices such as wireless sensor network (WSN) and smart cards. The lack of a battery in wireless sensor network limits the processing power of these devices, but they still require security. It was widely believed that devices with such constrained resources cannot incorporate a strong HECC processor for performing cryptographic operations such as elliptic curve scalar multiplication (ECSM) or hyperelliptic curve divisor multiplication (HCDM). However, the work presented in this thesis has demonstrated the feasibility of integrating an HECC processor into such devices through the use of the proposed architecture synthesis and optimization techniques for several inversion-free algorithms. The goal of this work is to develop a hardware implementation of binary elliptic and hyperelliptic curves. The focus is on the modeling of three factors: register allocation, operation scheduling, and storage binding. These factors were then integrated into architecture synthesis and optimization techniques in order to determine the best overall implementation suitable for constrained devices. The main purpose of the optimization is to reduce the area and power. Through analysis of the architecture optimization techniques for both datapath and control unit synthesis, the number of registers was reduced by an average of 30%. The use of the proposed efficient explicit formula for the different algorithms also enabled a reduction in the number of read/write operations from/to the register file, which reduces the processing power consumption. As a result, an overall HECC processor requires from 1843 to 3595 slices for a Xilinix XC4VLX200 and the total computation time is limited to between 10.08 ms to 15.82 ms at a maximum frequency of 50 MHz for a varity of inversion-free coordinate systems in hyperelliptic curves. The value of the new model has been demonstrated with respect to its implementation in elliptic and hyperelliptic curve crypogrpahic algorithms, through both synthesis and simulations. In summary, a framework has been provided for consideration of interactions with synthesis and optimization through architecture modeling for constrained enviroments. Insights have also been presented with respect to improving the design process for cryptogrpahic algorithms through datapath and control unit analysis

    Part I:

    Get PDF
    corecore