Hashing into Jacobi Quartic Curves
暂无分享,去创建一个
Bao Li | Wei Yu | Xiaoyang He | Kunpeng Wang | Song Tian
[1] H. Hisil. Elliptic curves, group law, and efficient computation , 2010 .
[2] Marc Joye,et al. The Jacobi Model of an Elliptic Curve and Side-Channel Analysis , 2003, AAECC.
[3] Mehdi Tibouchi,et al. Deterministic Encoding and Hashing to Odd Hyperelliptic Curves , 2010, Pairing.
[4] Hovav Shacham,et al. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps , 2003, EUROCRYPT.
[5] David P. Jablon. Strong password-only authenticated key exchange , 1996, CCRV.
[6] M. Skalba. Points on elliptic curves over finite fields , 2005 .
[7] Ed Dawson,et al. Jacobi Quartic Curves Revisited , 2009, ACISP.
[8] Igor E. Shparlinski,et al. Indifferentiable deterministic hashing to elliptic and hyperelliptic curves , 2012, Math. Comput..
[9] Ben Lynn,et al. Toward Hierarchical Identity-Based Encryption , 2002, EUROCRYPT.
[10] Colin Boyd,et al. Elliptic Curve Based Password Authenticated Key Exchange Protocols , 2001, ACISP.
[11] Christiaan E. van de Woestijne,et al. Construction of Rational Points on Elliptic Curves over Finite Fields , 2006, ANTS.
[12] M. Ulas. Rational points on certain hyperelliptic curves over finite fields , 2007, 0706.1448.
[13] Sylvain Duquesne,et al. Tate Pairing Computation on Jacobi's Elliptic Curves , 2012, Pairing.
[14] Bao Li,et al. Pairing Computation on Elliptic Curves of Jacobi Quartic Form , 2010, IACR Cryptol. ePrint Arch..
[15] Bao Li,et al. About Hash into Montgomery Form Elliptic Curves , 2013, ISPEC.
[16] Mehdi Tibouchi,et al. Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves , 2010, LATINCRYPT.
[17] Xavier Boyen,et al. Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography) , 2003, CRYPTO.
[18] Sarvar Patel,et al. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman , 2000, EUROCRYPT.
[19] Jean-Sébastien Coron,et al. Efficient Indifferentiable Hashing into Ordinary Elliptic Curves , 2010, CRYPTO.
[20] Reza Rezaeian Farashahi. Hashing into Hessian Curves , 2011, AFRICACRYPT.
[21] Bao Li,et al. Construct Hash Function from Plaintext to C34Curves , 2012 .
[22] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[23] Thomas Icart,et al. How to Hash into Elliptic Curves , 2009, IACR Cryptol. ePrint Arch..
[24] Antoine Joux,et al. Injective Encodings to Elliptic Curves , 2013, ACISP.
[25] Yehuda Lindell,et al. Highly-Efficient Universally-Composable Commitments based on the DDH Assumption , 2011, IACR Cryptol. ePrint Arch..
[26] Kwangjo Kim,et al. ID-Based Blind Signature and Ring Signature from Pairings , 2002, ASIACRYPT.
[27] Joonsang Baek,et al. Identity-Based Threshold Decryption , 2004, Public Key Cryptography.
[28] Jean-Jacques Quisquater,et al. Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups , 2004, Public Key Cryptography.