@ARTICLE{Alimoradi, author = {alimoradi, reza and }, title = {Hyper Elliptic Curve In Cryptography}, volume = {4}, number = {2}, abstract ={In public key cryptography, systems based on integer factorization problem are increasing replaced by systems based on discrete logarithm problem (DLP). In fact, Elliptic curve cryptography(ECC) makes the key size much smaller than similar RSA systems do that is why ECC became very popular among cryptography system designers. The designers always need to get to a cryptography system with the smallest key size the highest security. Thus they tend to use hyper elliptic curve in cryptography. In this paper, we will study how to use this type of curves in cryptography. Also, this study takes a look at these curves’ resistance against algorithms of solving the discrete logarithm problem. Energy consumed for implementation of the scalar multiplication in hyper elliptic curves of the genus g<5 will be analyzed too. }, URL = {http://monadi.isc.org.ir/article-1-44-en.html}, eprint = {http://monadi.isc.org.ir/article-1-44-en.pdf}, journal = {Biannual Journal Monadi for Cyberspace Security (AFTA)}, doi = {}, year = {2016} }