International Association for Cryptologic Research (IACR)
Abstract
In this note we describe some general-purpose, high-efficiency elliptic curves tailored for security levels beyond 2128. For completeness, we also include legacy-level curves at standard security levels. The choice of curves was made to facilitate state-of-the-art implementation techniques