Get the latest tech news
Elligator: Elliptic-curve points indistinguishable from uniform random strings (2013)
Cited ByView all - Bock EBrzuska CLai R(2024)Simple Watermarking Pseudorandom Functions from Extractable Pseudorandom GeneratorsIACR Communications in Cryptology10.62056/aevur-10kOnline publication date: 8-Jul-2024 - Zhang XChen KDing JYang YZhang WYu N(2024)Provably Secure Public-Key Steganography Based on Elliptic Curve CryptographyIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.336121919(3148-3163)Online publication date: 2024 - Lin KLin JCai SWang WZhao C(2024)Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degreesDesigns, Codes and Cryptography10.1007/s10623-024-01368-z92:6(1823-1843)Online publication date: 5-Mar-2024 - Show More Cited By.
Boyd, C., Montague, P., and Nguyen, K. Q. Elliptic curve based password authenticated key exchange protocols. Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., and Tibouchi, M. Efficient indifferentiable hashing into ordinary elliptic curves. Faugère, J.-C., Perret, L., Petit, C., and Renault, G. Improving the complexity of index calculus algorithms in elliptic curves over binary fields.
Or read this on Hacker News