Abstract
Combining the ideas of Bauer, Teske and Weng, [1] and Gaudry, Schost [3], we give a low memory algorithm for computing the number of points on the Jacobian of a Picard curve. It is efficient enough to handle Picard curves over finite prime fields \({\mathbb F}_{p}\), where p is a prime with 58 bits. We present an example where the Jacobian has a prime group order of size 2174
Similar content being viewed by others
References
M. Bauer, E. Teske and A. Weng, Point counting on Picard curves, Math. Comp., posted on March 31, 2005 PII S 0025-5718(05)01758-8, to appear in print.
H. Cohen, A Course in Computational Algebraic Number Theory Graduate Texts in Mathematics 138, 3rd edition, Springer (1996).
P. Gaudry and É. Schost, A Low-Memory Parallel Version of Matsuo, Chao and Tsujii’s Algorithm. ANTS VI, LNCS 3076, Springer (2004) pp. 208–222.
K. Matsuo, J. Chao and S. Tsujii, An improved baby step giant step algorithm for point counting of hyperelliptic curves over finite fields. In C. Fiecker and D. Kohel (eds.), ANTS V, LNCS, Vol. 2369, Springer (2002) pp. 461–474.
S. Pohlig M. Hellman (1978) ArticleTitleAn improved algorithm for computing logarithms over GF(p) and its cryptographic significance IEEE Trans. Inform. Theory 24 106–110 Occurrence Handle10.1109/TIT.1978.1055817 Occurrence Handle58 #4617
J.M. Pollard (1978) ArticleTitleMonte Carlo methods for index computation (mod p) Math. Comp. 32 IssueID143 918–924 Occurrence Handle0382.10001 Occurrence Handle58 #10684
N. Thériault, Index calculus attack for hyperelliptic curves of small genus, In G. Laih, (ed.), Advances in cryptology, Asiacrypt 2003, LNCS 2894, Springer (2003) pp. 75–92.
P.C. Oorschot Particlevan M.J. Wiener (1999) ArticleTitleParallel collision search with cryptanalytic applications J. Cryptol. 12 1–28
Author information
Authors and Affiliations
Corresponding author
Additional information
Communicated by: A. Menezes
Rights and permissions
About this article
Cite this article
Weng, A. A Low-Memory Algorithm for Point Counting on Picard Curves. Des Codes Crypt 38, 383–393 (2006). https://doi.org/10.1007/s10623-005-1598-y
Received:
Revised:
Accepted:
Issue Date:
DOI: https://doi.org/10.1007/s10623-005-1598-y