23
Views
0
CrossRef citations to date
0
Altmetric
Research Article

Elliptic divisibility sequences over the Edwards model of elliptic curves

&
Pages 2289-2304 | Received 01 Oct 2019, Published online: 11 Mar 2021

References

  • Daniel J. Bernstein, Tandja Lange, Faster addition and doubling on elliptic curves, In International Conference on the Theory and Application of Cryptology and Information Security, pp. 29-50. Springer, 2007.
  • Daniel J. Bernstein, Tandja Lange, A Complete set of addition laws for incomplete Edwards curves, Journal of Number Theory, 131(5) pp.858-872, 2011. doi: 10.1016/j.jnt.2010.06.015
  • Daniel J. Bernstein, Peter Birkner, Marc Joyce, Tandja Lange, Christiane Peters, Twisted Edwards curves, In International Conference on Cryptology in Africa, Springer, pp. 389-505, 2008.
  • Dan Boneh, Matthew K. Franklin, Identity-Based Encryption from the Weil Pairing, Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference Santa Barbara California USA August 19-23, Proceedings , pp. 213-229, (2001).
  • N. Diarra, E. Fouotsa, An Encoding for the Theta Model of Elliptic Curves, Innovations and Interdisciplinary Solutions for Underserved Areas, vol. 249, pp. 224-235, (2019). doi: 10.1007/978-3-319-98878-8_21
  • Harolds Edwards, A normal form for elliptic curves, Bulletin of the American Mathematical Society, 44(3) pp. 393-422, 2007. doi: 10.1090/S0273-0979-07-01153-6
  • Diffie, W., Hellman, M.E., New directions in cryptography, IEEE Transactions on Information Theory, vol. 32, pp. 644-654, (1976). doi: 10.1109/TIT.1976.1055638
  • E. Fouotsa, Parallelizing pairings on Hessian elliptic curves, Arab Journal of Mathematical Sciences, vol. 25:1, pp. 29-42, (2019). doi: 10.1016/j.ajmsc.2018.06.001
  • El Gamal T, A public key cryptosystem and signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, vol. 31, pp. 473-496, (1985). doi: 10.1109/TIT.1985.1057075
  • Neal Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48, pp. 203-209, (1987).
  • Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson, Twisted Edwards curves revisited, In International Conference on the Theory and Application of Cryptology and Information Security, Springer, pp. 326-343, 2008.
  • L. Hitt, G. McGuire, R. Moloney, Division polynomial for twisted curves, (2008). Link: http://arxi.org/abs/0809.2182.
  • R. Moloney and G. McGuire, Two kinds of division polynomials for twisted Edwards curves, Applicable Algebra in Engineering, Communication and Computing, 22, pp. 321-345. Link: https://link.springer.com/article/10.1007/2Fs00200-011-0153-5
  • Benot Libert, Jean-Jacques Quisquater, Identity Based Undeniable Signatures, Topics in Cryptology - CT-RSA 2004, The Cryptographers’ Track at the RSA Conference San Francisco CA USA February 23-27 Proceedings , pp. 112-125, (2004).
  • E. Mehta, A. Solanki, Minimization of mean square error for improved euler elliptic curve secure hash cryptography for textual data, Journal of Information and Optimization Sciences, vol. 38:6, pp. 813-826, (2017). doi: 10.1080/02522667.2017.1372131
  • Use of elliptic curves in cryptography, New directions in cryptography, Advances in Cryptology - CRYPTO’85, vol. 218, pp. 417-426, (1986).
  • A. Nitaj, E. Fouotsa, A new attack on RSA and Demytko’s elliptic curve cryptosystem, Journal of Discrete Mathematical Sciences and Cryptography, vol. 22:3, pp. 391-409, (2019).
  • R. Shipsey Elliptic divisibility sequences, Ph.D. Thesis. Goldsmith’s College University of London, (2000).
  • K. Stange, Elliptic nets and elliptic curves, Algebra and Number Theory 2, vol. 5, pp. 197-229, (2011). doi: 10.2140/ant.2011.5.197
  • Swart C. S. Elliptic curves and related sequences. Ph.D thesis, Royal Holloway and Bedford New college, University of London, (2003).
  • M. Ward, Memoir on elliptic divisibility sequences, Amer. J. Math. vol. 31-74, pp. 70, (1948).
  • L. C. Washington, Elliptic Curves Number Theory and Cryptography, University of Maryland.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.