Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves

Josep M. Miret, Rosana Tomàs, Magda Valls, Daniel Sadornil, Juan Tena. Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves. Australian Computer Journal, 40(4):263-274, 2008. [doi]

Abstract

Abstract is missing.