The present article provides a novel hash function $\mathcal{H}$ to any elliptic curve of $j$-invariant $\neq 0, 1728$ over a finite field $\mathbb{F}_{\!q}$ of large characteristic. The unique bottleneck of $\mathcal{H}$ consists in extracting a square root in $\mathbb{F}_{\!q}$ as well as for most hash functions. However, $\mathcal{H}$ is designed in such a way that the root can be found by (Cipolla--Lehmer--)Müller\u27s algorithm in constant time. Violation of this security condition is known to be the only obstacle to applying the given algorithm in the cryptographic context. When the field $\mathbb{F}_{\!q}$ is highly $2$-adic and $q \equiv 1 \ (\mathrm{mod} \ 3)$, the new batching technique is the state-of-the-art hashing solution exc...
International audienceThis article generalizes the simplified Shallue–van de Woestijne–Ulas (SWU) me...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...
Let $\mathbb{F}_{\!q}$ be a finite field and $E_b\!: y^2 = x^3 + b$ be an ordinary elliptic $\mathbb...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of)...
In this article we produce the simplified SWU encoding to some Barreto--Naehrig curves, including BN...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot i...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot i...
International audienceA number of recent works have considered the problem of constructing constant-...
This article develops a novel method of generating \u27\u27independent\u27\u27 points on an ordinary...
We describe a hashing function from the elements of the finite field $\F_q$ into points on a Hessian...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceThis article generalizes the simplified Shallue–van de Woestijne–Ulas (SWU) me...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...
Let $\mathbb{F}_{\!q}$ be a finite field and $E_b\!: y^2 = x^3 + b$ be an ordinary elliptic $\mathbb...
The present article explains how to generalize the hash function SwiftEC (in an elementary quasi-uni...
This article proposes four optimizations of indifferentiable hashing onto (prime-order subgroups of)...
In this article we produce the simplified SWU encoding to some Barreto--Naehrig curves, including BN...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot i...
International audienceWe present a specialized point-counting algorithm for a class of elliptic curv...
Last year Takashima proposed a version of Charles, Goren and Lauter's hash function using Richelot i...
International audienceA number of recent works have considered the problem of constructing constant-...
This article develops a novel method of generating \u27\u27independent\u27\u27 points on an ordinary...
We describe a hashing function from the elements of the finite field $\F_q$ into points on a Hessian...
International audienceA number of recent works have considered the problem of constructing constant-...
International audienceThis article generalizes the simplified Shallue–van de Woestijne–Ulas (SWU) me...
The BLS Digital Signature Algorithm is a cryptographic scheme using elliptic curves over finite fiel...
When a pairing e:G1×G2→GT, on an elliptic curve E defined over a finite field Fq, is exploited for a...