Abstract
We propose to investigate the aspects of computational performance as well as data and program storage requirements of cryptosystems based on Edwards elliptic curves, specifically those that can be obtained through the Elligator methodology, so as to avoid accidental or intentional hidden vulnerabilities. This research will cover not only the lower security levels (i.e. from legacy 2**80 …