10.07.2015 Views

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

here - Sites personnels de TELECOM ParisTech - Télécom ParisTech

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

5.4. Elliptic curves in cryptography 1573. l | Φ k (q) w<strong>here</strong> Φ k is the k-th cyclotomic polynomial.Different methods and families of curves verifying such conditions have been proposed. Overviewsof these constructions can be found in the survey of Freeman, Scott and Teske [101], the Master’sthesis of Bisson [17], or the Ph.D. thesis of Naehrig [215].

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!