Elliptic curve cryptosystems have become increasingly popular due to their efficiency and the small size of the keys they use. Particularly, the anomalous curves introduced by Koblitz allow a complex representation of the keys, denoted τNAF, that make the computations over these curves more efficient. In this article, we propose an efficient method for randomizing a τNAF to produce different equivalent representations of the same key to the same complex base τ. We prove that the average Hamming density of the resulting representations is 0.5. We identify the pattern of the τNAFs yielding the maximum number of representations and the formula governing this number. We also present deterministic methods to compute the average and the exact num...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
\u3cp\u3eSecure pseudo-random number generators (PRNGs) have a lot of important applications in cryp...
Randomization techniques play an important role in the protection of cryptosystems against implement...
Abstract. Randomization techniques play an important role in the pro-tection of cryptosystems agains...
Randomization techniques play an important role in the protection of cryptosystems against implement...
© 2018, Springer-Verlag GmbH Germany, part of Springer Nature. Koblitz curves allow very efficient e...
We propose a method for increasing the speed of scalar multiplication on binary anomalous (Koblitz)...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to th...
AbstractA random number generator based on the addition of points on an elliptic curve over finite f...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
\u3cp\u3eSecure pseudo-random number generators (PRNGs) have a lot of important applications in cryp...
Randomization techniques play an important role in the protection of cryptosystems against implement...
Abstract. Randomization techniques play an important role in the pro-tection of cryptosystems agains...
Randomization techniques play an important role in the protection of cryptosystems against implement...
© 2018, Springer-Verlag GmbH Germany, part of Springer Nature. Koblitz curves allow very efficient e...
We propose a method for increasing the speed of scalar multiplication on binary anomalous (Koblitz)...
Abstract. One of the main difficulties for implementing cryptographic schemes based on elliptic curv...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Abstract. We provide the first construction of a hash function into ordinary elliptic curves that is...
Elliptic curve cryptosystems (ECC) provides better security for each bit key utilized compared to th...
AbstractA random number generator based on the addition of points on an elliptic curve over finite f...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
At Crypto 2010, Brier et al. proposed the first construction of a hash function into ordinary ellipt...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
International audienceOne of the main difficulties for implementing cryptographic schemes based on ...
\u3cp\u3eSecure pseudo-random number generators (PRNGs) have a lot of important applications in cryp...