Indifferentiable deterministic hashing to elliptic and hyperelliptic curves (Q4911913): Difference between revisions

From MaRDI portal
Import240304020342 (talk | contribs)
Set profile property.
Set OpenAlex properties.
 
(One intermediate revision by one other user not shown)
Property / cites work
 
Property / cites work: Public Key Cryptography – PKC 2004 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing-Friendly Elliptic Curves of Prime Order / rank
 
Normal rank
Property / cites work
 
Property / cites work: Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5558394 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4783728 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434890 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4474196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3149768 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Indifferentiable Hashing into Ordinary Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Identity-Based Signature from Gap Diffie-Hellman Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Sequences, discrepancies and applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hashing into Hessian Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: On hashing into elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic Encoding and Hashing to Odd Hyperelliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Hierarchical ID-Based Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737264 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Hash into Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Encoding Points on Hyperelliptic Curves over Finite Fields in Deterministic Polynomial Time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2739459 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Careful with Composition: Limitations of the Indifferentiability Framework / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2776773 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank
Property / cites work
 
Property / cites work: Points on elliptic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rational Points on Certain Hyperelliptic Curves over Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: ID-Based Blind Signature and Ring Signature from Pairings / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1090/s0025-5718-2012-02606-8 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2080206293 / rank
 
Normal rank

Latest revision as of 10:26, 30 July 2024

scientific article; zbMATH DE number 6147281
Language Label Description Also known as
English
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves
scientific article; zbMATH DE number 6147281

    Statements

    Indifferentiable deterministic hashing to elliptic and hyperelliptic curves (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    20 March 2013
    0 references
    elliptic curve cryptography
    0 references
    hashing
    0 references
    random oracle model
    0 references
    exponential sums
    0 references
    pseudorandomness
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references