Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where David R. Kohel is active.

Publication


Featured researches published by David R. Kohel.


public key cryptography | 2006

Efficient scalar multiplication by isogeny decompositions

Christophe Doche; Thomas Icart; David R. Kohel

On an elliptic curve, the degree of an isogeny corresponds essentially to the degrees of the polynomial expressions involved in its application. The multiplication–by–l map [l] has degree l2, therefore the complexity to directly evaluate [l](p) is O(l2). For a small prime l (= 2, 3) such that the additive binary representation provides no better performance, this represents the true cost of application of scalar multiplication. If an elliptic curve admits an isogeny ϕ of degree l then the costs of computing ϕ(P) should in contrast be O(l) field operations. Since we then have a product expression [l]=


algorithmic number theory symposium | 2000

On Exponential Sums and Group Generators for Elliptic Curves over Finite Fields

David R. Kohel; Igor E. Shparlinski

\hat{\varphi}\varphi


international conference on the theory and application of cryptology and information security | 2006

The 2-adic CM method for genus 2 curves with application to cryptography

Pierrick Gaudry; Thomas Houtmann; David R. Kohel; Christophe Ritzenthaler; Annegret Weng

, the existence of an l-isogeny ϕ on an elliptic curve yields a theoretical improvement from O(l2) to O(l) field operations for the evaluation of [l](p) by naive application of the defining polynomials. In this work we investigate actual improvements for small l of this asymptotic complexity. For this purpose, we describe the general construction of families of curves with a suitable decomposition [l]=


international cryptology conference | 2009

Double-Base Number System for Multi-scalar Multiplications

Christophe Doche; David R. Kohel; Francesco Sica

\hat{\varphi}\varphi


Theoretical Computer Science | 2000

Secret-sharing with a class of ternary codes

Cunsheng Ding; David R. Kohel; San Ling

, and provide explicit examples of such a family of curves with simple decomposition for [3]. Finally we derive a new tripling algorithm to find complexity improvements to triplication on a curve in certain projective coordinate systems, then combine this new operation to non-adjacent forms for l-adic expansions in order to obtain an improved strategy for scalar multiplication on elliptic curves.


IEEE Transactions on Information Theory | 2000

Split group codes

Cunsheng Ding; David R. Kohel

In the paper an upper bound is established for certain exponential sums, analogous to Gaussian sums, defined on the points of an elliptic curve over a prime finite field. The bound is applied to prove the existence of group generators for the set of points on an elliptic curve over \(\mathbb{F}_{q}\) among certain sets of bounded size. We apply this estimate to obtain a deterministic O(q 1/2 + e) algorithm for finding generators of the group in echelon form, and in particular to determine its group structure.


international conference on the theory and application of cryptology and information security | 2011

Counting points on genus 2 curves with real multiplication

Pierrick Gaudry; David R. Kohel

The complex multiplication (CM) method for genus 2 is currently the most efficient way of generating genus 2 hyperelliptic curves defined over large prime fields and suitable for cryptography. Since low class number might be seen as a potential threat, it is of interest to push the method as far as possible. We have thus designed a new algorithm for the construction of CM invariants of genus 2 curves, using 2-adic lifting of an input curve over a small finite field. This provides a numerically stable alternative to the complex analytic method in the first phase of the CM method for genus 2. As an example we compute an irreducible factor of the Igusa class polynomial system for the quartic CM field ℚ (i√(75 + 12√(17))), whose class number is 50. We also introduce a new representation to describe the CM curves: a set of polynomials in (j1,j2,j3) which vanish on the precise set of triples which are the Igusa invariants of curves whose Jacobians have CM by a prescribed field. The new representation provides a speedup in the second phase, which uses Mestres algorithm to construct a genus 2 Jacobian of prime order over a large prime field for use in cryptography.


international conference on the theory and application of cryptology and information security | 2003

The AGM-X0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting

David R. Kohel

The Joint Sparse Form is currently the standard representation system to perform multi-scalar multiplications of the form [n ]P + m [Q ]. We introduce the concept of Joint Double-Base Chain, a generalization of the Double-Base Number System to represent simultaneously n and m . This concept is relevant because of the high redundancy of Double-Base systems, which ensures that we can find a chain of reasonable length that uses exactly the same terms to compute both n and m . Furthermore, we discuss an algorithm to produce such a Joint Double-Base Chain. Because of its simplicity, this algorithm is straightforward to implement, efficient, and also quite easy to analyze. Namely, in our main result we show that the average number of terms in the expansion is less than 0.3945log2 n . With respect to the Joint Sparse Form, this induces a reduction by more than 20% of the number of additions. As a consequence, the total number of multiplications required for a scalar multiplications is minimal for our method, across all the methods using two precomputations, P + Q and P *** Q . This is the case even with coordinate systems offering very cheap doublings, in contrast with recent results on scalar multiplications. Several variants are discussed, including methods using more precomputed points and a generalization relevant for Koblitz curves. Our second contribution is a new way to evaluate


IEEE Transactions on Information Theory | 2000

Elementary 2-group character codes

Cunsheng Ding; David R. Kohel; San Ling

\widehat\phi


algorithmic number theory symposium | 2014

On the quaternion l-isogeny path problem

David R. Kohel; Kristin E. Lauter; Christophe Petit; Jean-Pierre Tignol

, the dual endomorphism of the Frobenius. Namely, we propose formulae to compute

Collaboration


Dive into the David R. Kohel's collaboration.

Top Co-Authors

Avatar

Christophe Ritzenthaler

Autonomous University of Barcelona

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Cunsheng Ding

Hong Kong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

San Ling

Nanyang Technological University

View shared research outputs
Top Co-Authors

Avatar

Igor E. Shparlinski

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Francesco Sica

Mount Allison University

View shared research outputs
Researchain Logo
Decentralizing Knowledge