How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
One-way functions and pseudorandom generators
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Use of elliptic curves in cryptography
Lecture notes in computer sciences; 218 on Advances in cryptology---CRYPTO 85
RSA and Rabin functions: certain parts are as hard as the whole
SIAM Journal on Computing - Special issue on cryptography
How discreet is the discrete log?
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
Fundamentals of Applied Probability Theory
Fundamentals of Applied Probability Theory
A subexponential algorithm for the discrete logarithm problem with applications to cryptography
SFCS '79 Proceedings of the 20th Annual Symposium on Foundations of Computer Science
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Deterministic simulation of probabilistic constant depth circuits
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
How To Construct Randolli Functions
SFCS '84 Proceedings of the 25th Annual Symposium onFoundations of Computer Science, 1984
Reducing elliptic curve logarithms to logarithms in a finite field
STOC '91 Proceedings of the twenty-third annual ACM symposium on Theory of computing
On the implementation of elliptic curve cryptosystems
CRYPTO '89 Proceedings on Advances in cryptology
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Elliptic Curve Pseudorandom Sequence Generators
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Generic Groups, Collision Resistance, and ECDSA
Designs, Codes and Cryptography
Extractors for binary elliptic curves
Designs, Codes and Cryptography
The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
A Timing-Resistant Elliptic Curve Backdoor in RSA
Information Security and Cryptology
Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
New stream ciphers based on elliptic curve point multiplication
Computer Communications
Implementation and analysis of stream ciphers based on the elliptic curves
Computers and Electrical Engineering
Simultaneous Hardcore Bits and Cryptography against Memory Attacks
TCC '09 Proceedings of the 6th Theory of Cryptography Conference on Theory of Cryptography
Finding good random elliptic curves for cryptosystems defined over IF2n
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
On the complexity of hyperelliptic discrete logarithm problem
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Counting the number of points on elliptic curves over finite fields: strategies and performances
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An elliptic curve backdoor algorithm for RSASSA
IH'06 Proceedings of the 8th international conference on Information hiding
A security analysis of the NIST SP 800-90 elliptic curve random number generator
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
Extractors for Jacobian of hyperelliptic curves of genus 2 in odd characteristic
Cryptography and Coding'07 Proceedings of the 11th IMA international conference on Cryptography and coding
Space-efficient kleptography without random oracles
IH'07 Proceedings of the 9th international conference on Information hiding
Kleptography from standard assumptions and applications
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
A space efficient backdoor in RSA and its applications
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Public-Key cryptography from new multivariate quadratic assumptions
PKC'12 Proceedings of the 15th international conference on Practice and Theory in Public Key Cryptography
POSTER: Identity-based steganography and its applications to censorship resistance
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Elligator: elliptic-curve points indistinguishable from uniform random strings
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Hi-index | 0.00 |
Recent research in cryptography has led to the construction of several pseudo-random bit generators, programs producing bits as hard to predict as solving a hard problem. In this paper, 1. We present a new pseudo-random bit generator based on elliptic curves. 2. To construct our generator, we also develop two techniques that are of independent interest: (a) an algorithm that computes the order of an element in an arbitrary Abelian group; and (b) a new oracle proof method for demonstrating the simultaneous security of multiple bits of a discrete logarithm in an arbitrary Abelian group. 3. We present a new candidate hard problem for future use in cryptography: the elliptic logarithm problem.