Sciweavers

53 search results - page 2 / 11
» How to Hash into Elliptic Curves
Sort
View
LATINCRYPT
2010
13 years 7 months ago
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Let E be a non-supersingular elliptic curve over a finite field Fq. At CRYPTO 2009, Icart introduced a deterministic function Fq → E(Fq) which can be computed efficiently, and ...
Pierre-Alain Fouque, Mehdi Tibouchi
ISCAS
2002
IEEE
112views Hardware» more  ISCAS 2002»
14 years 1 months ago
Tradeoff analysis of FPGA based elliptic curve cryptography
FPGAs are an attractive platform for elliptic curve cryptography hardware. Since field multiplication is the most critical operation in elliptic curve cryptography, we have studi...
Marcus Bednara, M. Daldrup, Jürgen Teich, Joa...
PAIRING
2010
Springer
179views Cryptology» more  PAIRING 2010»
13 years 7 months ago
Deterministic Encoding and Hashing to Odd Hyperelliptic Curves
In this paper we propose a very simple and efficient encoding function from Fq to points of a hyperelliptic curve over Fq of the form H : y2 = f(x) where f is an odd polynomial. Hy...
Pierre-Alain Fouque, Mehdi Tibouchi
DCC
2001
IEEE
14 years 8 months ago
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves
Recently, and contrary to the common belief, Rivest and Silverman argued that the use of strong primes is unnecessary in the RSA cryptosystem. This paper analyzes how valid this as...
Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takag...
IEICET
2008
147views more  IEICET 2008»
13 years 8 months ago
Computing the Ate Pairing on Elliptic Curves with Embedding Degree k = 9
For AES 128 security level there are several natural choices for pairing-friendly elliptic curves. In particular, as we will explain, one might choose curves with k = 9 or curves w...
Xibin Lin, Changan Zhao, Fangguo Zhang, Yanming Wa...