Mostra el registre d'ítem simple
Orders of CM elliptic curves modulo p with at most two primes
dc.contributor.author | Iwaniec, H. |
dc.contributor.author | Jiménez Urroz, Jorge |
dc.contributor.other | Universitat Politècnica de Catalunya. Departament de Matemàtica Aplicada IV |
dc.date.accessioned | 2012-05-08T11:42:08Z |
dc.date.available | 2012-05-08T11:42:08Z |
dc.date.created | 2010 |
dc.date.issued | 2010 |
dc.identifier.citation | Iwaniec, H.; Jimenez, J. Orders of CM elliptic curves modulo p with at most two primes. "Annali della Scuola Normale Superiore di Pisa. Classe di scienze", 2010, vol. 9, núm. 4, p. 815-832. |
dc.identifier.issn | 0391-173X |
dc.identifier.uri | http://hdl.handle.net/2117/15793 |
dc.description.abstract | Nowadays the generation of cryptosystems requires two main aspects. First the security, and then the size of the keys involved in the construction and comunication process. About the former one needs a di±cult mathematical assumption which ensures your system will not be broken unless a well known di±cult problem is solved. In this context one of the most famous assumption underlying a wide variety of cryptosystems is the computation of logarithms in ¯nite ¯elds and the Di±e Hellman assumption. However it is also well known that elliptic curves provide good examples of representation of abelian groups reducing the size of keys needed to guarantee the same level of security as in the ¯nite ¯eld case. The ¯rst thing one needs to perform elliptic logarithms which are computationaly secure is to ¯x a ¯nite ¯eld, Fp, and one curve, E=Fp de¯ned over the ¯eld, such that jE(Fp)j has a prime factor as large as possible. In practice the problem of ¯nding such a pair, of curve and ¯eld, seems simple, just take a curve with integer coe±cients and a prime p of good reduction at random and see if jE(Fp)j has a big prime factor. However the theory that makes the previous algorithm useful is by no means obvious, neither clear or complete. For example it is well known that supersingular elliptic curves have to be avoided in the previous process since they reduce the security of any cryptosystem based on the Di±e Hellman assumption on the elliptic logarithm. But more importantly, the process will be feasible whenever the probability to ¯nd a pair, (E; p), with a big prime factor qj jE(Fp)j is big enough. One problem arises naturally from the above. |
dc.format.extent | 18 p. |
dc.language.iso | eng |
dc.rights | Attribution-NonCommercial-NoDerivs 3.0 Spain |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/3.0/es/ |
dc.subject | Àrees temàtiques de la UPC::Matemàtiques i estadística::Anàlisi matemàtica::Equacions funcionals |
dc.subject.lcsh | Differential equations, Elliptic |
dc.title | Orders of CM elliptic curves modulo p with at most two primes |
dc.type | Article |
dc.subject.lemac | Equacions diferencials el·líptiques |
dc.contributor.group | Universitat Politècnica de Catalunya. MAK - Matemàtica Aplicada a la Criptografia |
dc.description.peerreviewed | Peer Reviewed |
dc.subject.ams | 35J Partial differential equations of elliptic type |
dc.rights.access | Restricted access - publisher's policy |
local.identifier.drac | 9510582 |
dc.description.version | Postprint (published version) |
local.citation.author | Iwaniec, H.; Jimenez, J. |
local.citation.publicationName | Annali della Scuola Normale Superiore di Pisa. Classe di scienze |
local.citation.volume | 9 |
local.citation.number | 4 |
local.citation.startingPage | 815 |
local.citation.endingPage | 832 |
Fitxers d'aquest items
Aquest ítem apareix a les col·leccions següents
-
Articles de revista [48]
-
Articles de revista [3.268]