Extractors for binary elliptic curves
DOI10.1007/S10623-008-9187-5zbMATH Open1182.14033OpenAlexW2127083680MaRDI QIDQ1009079FDOQ1009079
Authors: Reza Rezaeian Farashahi, Andrey Sidorenko, Ruud Pellikaan
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-008-9187-5
Recommendations
- On Randomness Extraction in Elliptic Curves
- Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol
- The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
- Two-source randomness extractors for elliptic curves for authenticated key exchange
- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves
Cryptography (94A60) Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Applications to coding theory and cryptography of arithmetic geometry (14G50) Elliptic curves (14H52)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- The Newton polygon of plane curves with many rational points
- On the Naor-Reingold pseudo-random function from elliptic curves
- Reducing elliptic curve logarithms to logarithms in a finite field
- Title not available (Why is that?)
- On the linear complexity and multidimensional distribution of congruential generators over elliptic curves
- Title not available (Why is that?)
- Certain Exponential Sums and Random Walks on Elliptic Curves
- Title not available (Why is that?)
- Public Key Cryptography - PKC 2006
- Title not available (Why is that?)
- Efficient arithmetic on Koblitz curves
- Title not available (Why is that?)
- Distribution of some sequences of points on elliptic curves
- Title not available (Why is that?)
- Constructive and destructive facets of Weil descent on elliptic curves
- Generalising the GHS Attack on the Elliptic Curve Discrete Logarithm Problem
- Title not available (Why is that?)
- Efficient Pseudorandom Generators Based on the DDH Assumption
- Curves of every genus with many points. I: Abelian and toric families.
- Title not available (Why is that?)
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree
- Structure of parallel multipliers for a class of fields \(GF(2^ m)\)
- Cryptographic implications of Hess' generalized GHS attack
- A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator
- Title not available (Why is that?)
- The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
Cited In (9)
- Secure simultaneous bit extraction from Koblitz curves
- Two-source randomness extractors for elliptic curves for authenticated key exchange
- The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
- Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol
- Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves
- Optimal Randomness Extraction from a Diffie-Hellman Element
- Construction of RNG using random automata and ``one-way functions
- On Randomness Extraction in Elliptic Curves
- Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic
This page was built for publication: Extractors for binary elliptic curves
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1009079)