Huff’s form for elliptic curves over a local ring
Let Fq be a finite field of order q=pc, where p is a prime number ≥3, c∈N∗. In this paper, we introduce Huff curves denoted Ha,b2 over the local ring R2=Fq[X]/(X2). At first, we recall the arithmetic of the ring R2. After that, we define Huff curves Ha,b2 over this ring and we study the group Ha,b2,...
| Published in: | Scientific African |
|---|---|
| Main Authors: | Abdelhakim Chillali, Moha Ben Taleb El Hamam, Abdelâli Grini |
| Format: | Article |
| Language: | English |
| Published: |
Elsevier
2025-03-01
|
| Subjects: | |
| Online Access: | http://www.sciencedirect.com/science/article/pii/S2468227625000675 |
Similar Items
Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications
by: Robert Dryło, et al.
Published: (2021-05-01)
by: Robert Dryło, et al.
Published: (2021-05-01)
Families of elliptic curves with rational 3-torsion
by: Moody Dustin, et al.
Published: (2012-02-01)
by: Moody Dustin, et al.
Published: (2012-02-01)
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01)
by: M. . Anikeev, et al.
Published: (2010-12-01)
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
by: Zakariae Cheddour, et al.
Published: (2023-11-01)
by: Zakariae Cheddour, et al.
Published: (2023-11-01)
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01)
by: Obukhov Vadim, et al.
Published: (2024-01-01)
The SPN Network for Digital Audio Data Based on Elliptic Curve Over a Finite Field
by: Ijaz Khalid, et al.
Published: (2022-01-01)
by: Ijaz Khalid, et al.
Published: (2022-01-01)
A Novel Image Encryption Scheme Based on Elliptic Curves over Finite Rings
by: Umar Hayat, et al.
Published: (2022-04-01)
by: Umar Hayat, et al.
Published: (2022-04-01)
Faster Point Scalar Multiplication on Short Weierstrass Elliptic Curves over Fp using Twisted Hessian Curves over Fp2
by: Michał Wroń
Published: (2016-09-01)
by: Michał Wroń
Published: (2016-09-01)
On hashing into elliptic curves
by: Farashahi Reza R., et al.
Published: (2009-12-01)
by: Farashahi Reza R., et al.
Published: (2009-12-01)
Cryptanalysis and improvement of an encryption scheme that uses elliptic curves over finite fields
by: Malik Zia, et al.
Published: (2021-12-01)
by: Malik Zia, et al.
Published: (2021-12-01)
Speeding-Up Elliptic Curve Cryptography Algorithms
by: Diana Maimuţ, et al.
Published: (2022-10-01)
by: Diana Maimuţ, et al.
Published: (2022-10-01)
Lightweight Elliptic Curve Cryptography Accelerator Over 25519 Curves
by: Piljoo Choi, et al.
Published: (2025-01-01)
by: Piljoo Choi, et al.
Published: (2025-01-01)
An attack on disguised elliptic curves
by: Morales David J. Mireles
Published: (2008-04-01)
by: Morales David J. Mireles
Published: (2008-04-01)
Compact elliptic curve representations
by: Ciet Mathieu, et al.
Published: (2011-06-01)
by: Ciet Mathieu, et al.
Published: (2011-06-01)
Lookup Table-Based Design of Scalar Multiplication for Elliptic Curve Cryptography
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
by: Yan-Duan Ning, et al.
Published: (2024-03-01)
Universal equations for rainfall distributions from SCS and Huff methods
by: André Luiz Lopes da Silveira
Published: (2024-09-01)
by: André Luiz Lopes da Silveira
Published: (2024-09-01)
Multi-Functional Resource-Constrained Elliptic Curve Cryptographic Processor
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
by: Binh Kieu Do-Nguyen, et al.
Published: (2023-01-01)
Elliptic Curve Cryptography with Machine Learning
by: Jihane Jebrane, et al.
Published: (2024-12-01)
by: Jihane Jebrane, et al.
Published: (2024-12-01)
ACryp-Proc: Flexible Asymmetric Crypto Processor for Point Multiplication
by: Malik Imran, et al.
Published: (2018-01-01)
by: Malik Imran, et al.
Published: (2018-01-01)
The review on elliptic curves as cryptographic pairing groups
by: E Khamseh
Published: (2021-05-01)
by: E Khamseh
Published: (2021-05-01)
Application of mathematical optimization in elliptic curve arithmetic
by: Alexander Igorevich Skripko, et al.
Published: (2017-07-01)
by: Alexander Igorevich Skripko, et al.
Published: (2017-07-01)
Kleptographic Attack on Elliptic Curve Based Cryptographic Protocols
by: Anum Sajjad, et al.
Published: (2020-01-01)
by: Anum Sajjad, et al.
Published: (2020-01-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
RFID security authentication scheme based on Montgomery-form elliptic curve cryptography
by: Wumei ZHANG
Published: (2016-05-01)
by: Wumei ZHANG
Published: (2016-05-01)
Area-Time Efficient Hardware Implementation of Modular Multiplication for Elliptic Curve Cryptography
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
by: MD. Mainul Islam, et al.
Published: (2020-01-01)
An Enhancement of the Elliptic Curve Cryptography by Using the PairingFunction
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
by: Sarah Hatem Namous, et al.
Published: (2025-07-01)
ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME
by: Ali M. Sagheer
Published: (2008-04-01)
by: Ali M. Sagheer
Published: (2008-04-01)
Fully distributed certificate authority based on polynomial over elliptic curve for MANET
by: Ahmad Alomari
Published: (2014-04-01)
by: Ahmad Alomari
Published: (2014-04-01)
A network security protection scheme for tax system based on elliptic curve cryptography
by: Wenjie Wang, et al.
Published: (2024-12-01)
by: Wenjie Wang, et al.
Published: (2024-12-01)
Certificateless Linkable Ring Signature Scheme
by: Lunzhi Deng, et al.
Published: (2020-01-01)
by: Lunzhi Deng, et al.
Published: (2020-01-01)
IMPLEMENTATION OF BLOM’S KEY PREDISTRIBUTION SCHEME BY USING ELLIPTIC CURVE CRYPTOGRAPHY
by: Md Nizam Udin, et al.
Published: (2021-05-01)
by: Md Nizam Udin, et al.
Published: (2021-05-01)
An Optimized Flexible Accelerator for Elliptic Curve Point Multiplication over NIST Binary Fields
by: Amer Aljaedi, et al.
Published: (2023-09-01)
by: Amer Aljaedi, et al.
Published: (2023-09-01)
Evaluation of Computational Approaches of Short Weierstrass Elliptic Curves for Cryptography
by: Abhishek Kunal, et al.
Published: (2021-12-01)
by: Abhishek Kunal, et al.
Published: (2021-12-01)
Cellular automata based key distribution for lightweight hybrid image encryption with elliptic curve cryptography
by: Biswarup Yogi, et al.
Published: (2025-10-01)
by: Biswarup Yogi, et al.
Published: (2025-10-01)
Optimal Elliptic-Curve Subspaces for Applications in Double-Authenticated Requests in Mobile Distributed Data Mining
by: Daniel Ioan Hunyadi, et al.
Published: (2022-12-01)
by: Daniel Ioan Hunyadi, et al.
Published: (2022-12-01)
On the Application of Noiseless Steganography and Elliptic Curves Cryptography Digital Signature Algorithm Methods in Securing Text Messages
by: Juhari Juhari, et al.
Published: (2022-10-01)
by: Juhari Juhari, et al.
Published: (2022-10-01)
An anonymous authentication protocol for vehicle to grid based on elliptic curve cryptography
by: Zeyu Sun, et al.
Published: (2025-08-01)
by: Zeyu Sun, et al.
Published: (2025-08-01)
Elliptic curve cryptography and biometrics for iot authentication
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
by: Dargaoui Souhayla, et al.
Published: (2025-01-01)
Elliptic-Curve Crypto Processor for RFID Applications
by: Muhammad Rashid, et al.
Published: (2021-07-01)
by: Muhammad Rashid, et al.
Published: (2021-07-01)
Classification of Elements in Elliptic Curve Over the Ring 𝔽q[ɛ]
by: Selikh Bilel, et al.
Published: (2021-11-01)
by: Selikh Bilel, et al.
Published: (2021-11-01)
Similar Items
-
Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications
by: Robert Dryło, et al.
Published: (2021-05-01) -
Families of elliptic curves with rational 3-torsion
by: Moody Dustin, et al.
Published: (2012-02-01) -
Automated Correctness Proof of Algorithm Variants in Elliptic Curve Cryptography
by: M. . Anikeev, et al.
Published: (2010-12-01) -
Generalized Fibonacci Sequences for Elliptic Curve Cryptography
by: Zakariae Cheddour, et al.
Published: (2023-11-01) -
Methods for using elliptic curves in cryptography
by: Obukhov Vadim, et al.
Published: (2024-01-01)
