Security Analysis of the PACE Key-Agreement Protocol
ISC '09 Proceedings of the 12th International Conference on Information Security
On a new formal proof model for RFID location privacy
Information Processing Letters
A New Protocol for the Nearby Friend Problem
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Efficient indifferentiable hashing into ordinary elliptic curves
CRYPTO'10 Proceedings of the 30th annual conference on Advances in cryptology
Estimating the size of the image of deterministic hash functions to elliptic curves
LATINCRYPT'10 Proceedings of the First international conference on Progress in cryptology: cryptology and information security in Latin America
Password based key exchange protocols on elliptic curves which conceal the public parameters
ACNS'10 Proceedings of the 8th international conference on Applied cryptography and network security
Deterministic encoding and hashing to odd hyperelliptic curves
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
Encoding points on hyperelliptic curves over finite fields in deterministic polynomial time
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
An efficient mobile PACE implementation
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security
A family of implementation-friendly BN elliptic curves
Journal of Systems and Software
AFRICACRYPT'11 Proceedings of the 4th international conference on Progress in cryptology in Africa
APPA: aggregate privacy-preserving authentication in vehicular Ad Hoc networks
ISC'11 Proceedings of the 14th international conference on Information security
The geometry of flex tangents to a cubic curve and its parameterizations
Journal of Symbolic Computation
Supplemental access control (PACE v2): security analysis of PACE integrated mapping
Cryptography and Security
Verified indifferentiable hashing into elliptic curves
POST'12 Proceedings of the First international conference on Principles of Security and Trust
Insider attacks and privacy of RFID protocols
EuroPKI'11 Proceedings of the 8th European conference on Public Key Infrastructures, Services, and Applications
Indifferentiable hashing to barreto---naehrig curves
LATINCRYPT'12 Proceedings of the 2nd international conference on Cryptology and Information Security in Latin America
T-Match: privacy-preserving item matching for storage-only RFID tags
RFIDSec'12 Proceedings of the 8th international conference on Radio Frequency Identification: security and privacy issues
Elligator: elliptic-curve points indistinguishable from uniform random strings
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Verified indifferentiable hashing into elliptic curves
Journal of Computer Security - Security and Trust Principles
Hi-index | 0.00 |
We describe a new explicit function that given an elliptic curve E defined over $\mathbb F_{p^n}$, maps elements of $\mathbb F_{p^n}$ into E in deterministic polynomial time and in a constant number of operations over $\mathbb F_{p^n}$. The function requires to compute a cube root. As an application we show how to hash deterministically into an elliptic curve.