Cryptography Reference
In-Depth Information
Algorithm 27 Elkies' algorithm. (Source code provided by Drew Sutherland.)
INPUT: A,B
∈ k
, > 2, j, ˜
∈ k
OUTPUT: A, B,ψ ( x )
1: Compute φ x , φ y , φ xx , φ yy and φ xy
Compute A and B
18 B/A ,let j =
j / (1728
2: Let m
=
mj , and let k
=
j )
˜ / ˜ , and let k
3: Let ˜ =−
j φ x / ( φ y ), let m
˜ / (1728
=
=
˜ )
4: Let A
mk/ 48 and B
m 2 k/ 864
4
6
=
=
( j 2 φ xx +
2 j ˜ φ xy +
2 ˜ 2 φ yy ) / ( j φ x )
5: Let r
=−
Compute p 1
k ) / 4
6: Let p 1 =
( r/ 2
+
( k
+
( m
m ) / 3)
7: Let d
=
(
1) / 2
Compute the power sums t n of the roots of ψ ( x )
A ) / 30, and t 3 =
8: Let t 0 =
d , t 1 =
p 1 / 2, t 2 =
((1
10 d ) A
((1
28 d ) B
42 t 1 A
B ) / 70
9: Let c 0 =
0, c 1 =
6 t 2 +
2 At 0 , c 2 =
10 t 3 +
6 At 1 +
4 Bt 0
10: for n
=
2to d
1 do
= n 1
Let s
i = 1 c i c n i
11:
Let
12:
3 s
(2 n
1)( n
1) Ac n 1
(2 n
2)( n
2) Bc n 2
c n + 1 =
( n
1)(2 n
+
5)
13: end for
14: for n
=
3to d
1 do
Let
15:
c n
(4 n
2) At n 1
(4 n
4) Bt n 2
t n + 1 =
4 n
+
2
16: end for
17: Let s 0 =
1
Compute the symmetric functions s n of the roots of ψ ( x )
18: for n
=
1to d do
Let s n = n i = 1 (
1) i t i s n i
19:
20: end for
21: return ψ ( x )
= i = 0 (
1) i s i x d i
) is non-zero but small compared with
, due to divisions by small integers arising in the power series expansions for the mod-
ular functions. Algorithms for the case of small characteristic will be mentioned in Sec-
tion 25.2.3 .
A number of calculations can fail when char(
k
25.2.2 Stark's algorithm
Stark [ 522 ] gave a method to compute the rational function giving the x -coordinate of an
endomorphism φ : E
E corresponding to a complex number β (interpreting End( E )as
a subset of
C
). The idea is to use the fact that, for an elliptic curve E over the complex
 
Search WWH ::




Custom Search