How to Hash into Elliptic Curves

From MaRDI portal
Publication:3183571

DOI10.1007/978-3-642-03356-8_18zbMath1252.94075OpenAlexW2131559681MaRDI QIDQ3183571

Thomas Icart

Publication date: 20 October 2009

Published in: Advances in Cryptology - CRYPTO 2009 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-03356-8_18




Related Items (31)

Hashing to elliptic curves of \(j\)-invariant 1728Unnamed ItemTrapdoor DDH groups from pairings and isogeniesIdentity-based undetachable digital signature for mobile agents in electronic commerceOptimal Encodings to Elliptic Curves of \(\boldsymbol{j}\)-Invariants 0, 1728Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random StringsA short non-delegatable strong designated verifier signature\textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curvesFast hashing to \(\mathbb{G}_2\) on pairing-friendly curves with the lack of twistsHow to sample a discrete Gaussian (and more) from a random oracleHashing to elliptic curves through Cipolla-Lehmer-Müller's square root algorithmDory: efficient, transparent arguments for generalised inner products and polynomial commitmentsUnnamed ItemInjective encodings to binary ordinary elliptic curvesBlind Transfer of Personal Data Achieving PrivacyHashing into Hessian CurvesImproved elliptic curve hashing and point representationIndifferentiable deterministic hashing to elliptic and hyperelliptic curvesOn the construction of elliptic Chudnovsky-type algorithms for multiplication in large extensions of finite fieldsOn a new formal proof model for RFID location privacyThe geometry of some parameterizations and encodingsOn subversion-resistant SNARKsDeterministic Encoding into Twisted Edwards CurvesEMBEDDING FINITE FIELDS INTO ELLIPTIC CURVESOn Indifferentiable Hashing into the Jacobian of Hyperelliptic Curves of Genus 2Security Analysis of the PACE Key-Agreement ProtocolThe geometry of flex tangents to a cubic curve and its parameterizationsUniform encodings to elliptic curves and indistinguishable point representationDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applicationsA Generalised Successive Resultants AlgorithmIndifferentiable hashing to ordinary elliptic \(\mathbb{F}_{q} \)-curves of \(j=0\) with the cost of one exponentiation in \(\mathbb{F}_{q} \)




This page was built for publication: How to Hash into Elliptic Curves