How to generate cryptographically strong sequences of pseudo-random bits
SIAM Journal on Computing
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Products of linear recurring sequences with maximum complexity
IEEE Transactions on Information Theory
A pseudo-random bit generator based on elliptic logarithms
Proceedings on Advances in cryptology---CRYPTO '86
CRYPTO '93 Proceedings of the 13th annual international cryptology conference on Advances in cryptology
Elliptic Curve Public Key Cryptosystems
Elliptic Curve Public Key Cryptosystems
Shift Register Sequences
Theory and application of trapdoor functions
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Binary pseudorandom sequences of period 2n-1 with ideal autocorrelation
IEEE Transactions on Information Theory
Theory and applications of q-ary interleaved sequences
IEEE Transactions on Information Theory
Designs, Codes and Cryptography
The Quadratic Extension Extractor for (Hyper)Elliptic Curves in Odd Characteristic
WAIFI '07 Proceedings of the 1st international workshop on Arithmetic of Finite Fields
Key generation based on elliptic curve over finite prime field
International Journal of Electronic Security and Digital Forensics
Remarks on Pseudorandom Binary Sequences Over Elliptic Curves
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Hi-index | 0.00 |
In this paper, we introduce a new approach to the generation of binary sequences by applying trace functions to elliptic curves over GF(2m). We call these sequences elliptic curve pseudorandom sequences (EC-sequence). We determine their periods, distribution of zeros and ones, and linear spans for a class of EC-sequences generated from supersingular curves. We exhibit a class of EC-sequences which has half period as a lower bound for their linear spans. EC-sequences can be constructed algebraically and can be generated efficiently in software or hardware by the same methods that are used for implementation of elliptic curve public-key cryptosystems.