International audienceWe analyze the security of the Elliptic Curve Linear Con-gruential Generator (EC-LCG). We show that this generator is insecure if sufficiently many bits are output at each iteration. In 2007, Gutierrez and Ibeas showed that this generator is insecure given a certain amount of most significant bits of some consecutive values of the sequence. Using the Coppersmith's methods, we are able to improve their security bounds
現今許多密碼系統的安全性, 是以橢圓曲線離散對數問題(ECDLP) 的困難度為基礎。這些密碼系統的安全性, 通常取決於曲線的選擇。在這篇論文中, 我們對現在針對橢圓曲線離散對數問題的攻擊法做一個整理,...
International audiencePractical implementations of cryptosystems often suffer from critical informat...
An elliptic curve random number generator (ECRNG) has been approved in a NIST standards and proposed...
In this paper we study the linear congruential generator on elliptic curves from the cryptographic p...
International audienceNumber-theoretic pseudorandom generators work by iterating an algebraic map F ...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
An elliptic curve random number generator (ECRNG) has been proposed in ANSI and NIST draft standards...
We define and analyze the Commutative Isogeny Hidden Number Problem which is the natural analogue of...
International audienceThis book constitutes the proceedings of the First International Conference on...
\u3cp\u3eSecure pseudo-random number generators (PRNGs) have a lot of important applications in cryp...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
This paper proposes a pseudorandom sequence generator for stream ciphers based on elliptic curves (...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
Lattice tests are quality measures for assessing the intrinsic structure of pseudorandom number gene...
現今許多密碼系統的安全性, 是以橢圓曲線離散對數問題(ECDLP) 的困難度為基礎。這些密碼系統的安全性, 通常取決於曲線的選擇。在這篇論文中, 我們對現在針對橢圓曲線離散對數問題的攻擊法做一個整理,...
International audiencePractical implementations of cryptosystems often suffer from critical informat...
An elliptic curve random number generator (ECRNG) has been approved in a NIST standards and proposed...
In this paper we study the linear congruential generator on elliptic curves from the cryptographic p...
International audienceNumber-theoretic pseudorandom generators work by iterating an algebraic map F ...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
An elliptic curve random number generator (ECRNG) has been proposed in ANSI and NIST draft standards...
We define and analyze the Commutative Isogeny Hidden Number Problem which is the natural analogue of...
International audienceThis book constitutes the proceedings of the First International Conference on...
\u3cp\u3eSecure pseudo-random number generators (PRNGs) have a lot of important applications in cryp...
L'usage des courbes elliptiques en cryptographie s'est largement répandu pour assurer la sécurité de...
This paper proposes a pseudorandom sequence generator for stream ciphers based on elliptic curves (...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
Lattice tests are quality measures for assessing the intrinsic structure of pseudorandom number gene...
現今許多密碼系統的安全性, 是以橢圓曲線離散對數問題(ECDLP) 的困難度為基礎。這些密碼系統的安全性, 通常取決於曲線的選擇。在這篇論文中, 我們對現在針對橢圓曲線離散對數問題的攻擊法做一個整理,...
International audiencePractical implementations of cryptosystems often suffer from critical informat...
An elliptic curve random number generator (ECRNG) has been approved in a NIST standards and proposed...