Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is indif-ferentiable from a random oracle, based on Icart’s deterministic encoding from Crypto 2009. While almost as efficient as Icart’s encoding, this hash function can be plugged into any cryptosystem that requires hashing into elliptic curves, while not compromising proofs of security in the random oracle model. We also describe a more general (but less efficient) construction that works for a large class of encodings into elliptic curves, for example the Shallue-Woestijne-Ulas (SWU) algorithm. Finally we describe the first deterministic encoding algorithm into elliptic curves in characteristic 3.
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
International audienceMany cryptographic systems based on elliptic curves are proven secure in the R...
Abstract. Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart ...
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in popular...
Abstract. When represented as a bit string in a standard way, even using point compression, an ellip...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceA number of recent works have considered the problem of constructing constant-...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
International audienceMany cryptographic systems based on elliptic curves are proven secure in the R...
Abstract. Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart ...
Pairing-friendly elliptic curves in the Barreto-Lynn-Scott family are seeing a resurgence in popular...
Abstract. When represented as a bit string in a standard way, even using point compression, an ellip...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...
International audienceApplications of elliptic curve cryptography to anonymity, privacy and censorsh...