In this paper we study the linear congruential generator on elliptic curves from the cryptographic point of view. We show that if sufficiently many of the most significant bits of the composer and of three consecutive values of the sequence are given, then one can recover the seed and the composer (even in the case where the elliptic curve is private). The results are based on lattice reduction techniques and improve some recent approaches of the same security problem. We also estimate limits of some heuristic approaches, which still remain much weaker than those known for nonlinear congruential generators. Several examples are tested using implementations of ours algorithms
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. We drastic...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
International audienceWe analyze the security of the Elliptic Curve Linear Con-gruential Generator (...
In recent years, methods based on lattice reduction have been used repeatedly for the cryptanalytic ...
The content of this thesis is situated between number theory and cryptology. It contributes in sever...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
We prove that a system of linear congruences of a particular form has at most a unique solution belo...
In [11] Scheidler, Stein and Williams proposed a key exchange protocol which makes use of the set of...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Abstract. We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. We drastic...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...
International audienceWe analyze the security of the Elliptic Curve Linear Con-gruential Generator (...
In recent years, methods based on lattice reduction have been used repeatedly for the cryptanalytic ...
The content of this thesis is situated between number theory and cryptology. It contributes in sever...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
In [2], Gallant, Lambert and Vanstone proposed a very efficient algorithm to compute Q = kP on ellip...
We prove that a system of linear congruences of a particular form has at most a unique solution belo...
In [11] Scheidler, Stein and Williams proposed a key exchange protocol which makes use of the set of...
Abstract. In this paper, we analyze the security of cryptosystems using short generators over ideal ...
In recent years, many applications of elliptic curves to cryptography have been developed. Cryptosy...
Abstract. We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. ...
The crux of elliptic curve cryptography, a popular mechanism for securing data, is an asymmetric pro...
We present an attack on one of the Hidden Pairing schemes proposed by Dent and Galbraith. We drastic...
The use of elliptic curves in cryptography has become widespread to ensure the security of communica...