Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves

Josep M. Miret, Rosana Tomàs, Magda Valls, Daniel Sadornil, Juan Tena. Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves. Australian Computer Journal, 40(4):263-274, 2008. [doi]

@article{MiretTVST08,
  title = {Exploiting Isogeny Cordillera Structure to Obtain Cryptographically Good Elliptic Curves},
  author = {Josep M. Miret and Rosana Tomàs and Magda Valls and Daniel Sadornil and Juan Tena},
  year = {2008},
  url = {http://ws.acs.org.au/jrpit/JRPITVolumes/JRPIT40/JRPIT40.4.263.pdf},
  researchr = {https://researchr.org/publication/MiretTVST08},
  cites = {0},
  citedby = {0},
  journal = {Australian Computer Journal},
  volume = {40},
  number = {4},
  pages = {263-274},
}