Verified indifferentiable hashing into elliptic curves Security and Trust Principles
Saved in:
Published in | Journal of computer security Vol. 21; no. 6; pp. 881 - 917 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
Amsterdam
IOS Press
2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Author | HERAUD, Sylvain GRÉGOIRE, Benjamin BARTHE, Gilles OLMEDO, Federico ZANELLA-BÉGUELIN, Santiago |
---|---|
Author_xml | – sequence: 1 givenname: Gilles surname: BARTHE fullname: BARTHE, Gilles organization: IMDEA Software Institute, Madrid, Spain – sequence: 2 givenname: Benjamin surname: GRÉGOIRE fullname: GRÉGOIRE, Benjamin organization: INRIA — Méditerranée, Sophia Antipolis, France – sequence: 3 givenname: Sylvain surname: HERAUD fullname: HERAUD, Sylvain organization: INRIA — Méditerranée, Sophia Antipolis, France – sequence: 4 givenname: Federico surname: OLMEDO fullname: OLMEDO, Federico organization: IMDEA Software Institute, Madrid, Spain – sequence: 5 givenname: Santiago surname: ZANELLA-BÉGUELIN fullname: ZANELLA-BÉGUELIN, Santiago organization: Microsoft Research, Cambridge, United Kingdom |
BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=28075905$$DView record in Pascal Francis |
BookMark | eNqNyjEOgjAUgOEXg4mg3qGLI0mpAu1sNB7AGDdSyqs8Uwtp0cTb6-ABnP7h-zNI_OBxBmkh6zKXSuwSSLkSVS5EfV1AFuOdc1EUSqZQXTCQJewY-Y6sxYB-It06ZL2OPfnbF6aBoXM0TmSYeYYXxhXMrXYR178uYXM8nPenfNTRaGeD9oZiMwZ66PBuhOR1qXi5_ff7AGIQOzc |
ContentType | Journal Article |
Copyright | 2015 INIST-CNRS |
Copyright_xml | – notice: 2015 INIST-CNRS |
DBID | IQODW |
DatabaseName | Pascal-Francis |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Applied Sciences Computer Science Mathematics |
EISSN | 1875-8924 |
EndPage | 917 |
ExternalDocumentID | 28075905 |
GroupedDBID | .4S .DC 0R~ 29K 4.4 6KP 8VB AAFNC ABDBF ABPTK ABUBZ ACGFS AEMOZ AFRHK AFRXA AKVCP ALMA_UNASSIGNED_HOLDINGS ARCSS ASPBG AVWKF BUYGV CAG COF D-I EAD EAP EAS EAU EBA EBE EBR EBS EBU EDO EIS EJD EMK EPL EST ESX FEDTE FIL HZ~ I-F IL9 IOS IQODW ITG ITH K1G MET MIO MV1 NGNOM O9- P2P PQQKQ QWB TH9 TUS XJE ZL0 |
ID | FETCH-pascalfrancis_primary_280759053 |
ISSN | 0926-227X |
IngestDate | Sun Oct 29 17:10:22 EDT 2023 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 6 |
Keywords | Probabilistic approach indifferentiability Group theory Elliptic curve Modeling Indistinguishability Elliptic equation Approximate reasoning Random oracle Public key Hashing Provable security random oracle model Library Cryptography Logic Computer security elliptic curve cryptography |
Language | English |
License | CC BY 4.0 |
LinkModel | OpenURL |
MergedId | FETCHMERGED-pascalfrancis_primary_280759053 |
ParticipantIDs | pascalfrancis_primary_28075905 |
PublicationCentury | 2000 |
PublicationDate | 2013 |
PublicationDateYYYYMMDD | 2013-01-01 |
PublicationDate_xml | – year: 2013 text: 2013 |
PublicationDecade | 2010 |
PublicationPlace | Amsterdam |
PublicationPlace_xml | – name: Amsterdam |
PublicationTitle | Journal of computer security |
PublicationYear | 2013 |
Publisher | IOS Press |
Publisher_xml | – name: IOS Press |
SSID | ssj0021198 |
Score | 3.9728127 |
SourceID | pascalfrancis |
SourceType | Index Database |
StartPage | 881 |
SubjectTerms | Algebra Applied sciences Artificial intelligence Computer science; control theory; systems Cryptography Exact sciences and technology Field theory and polynomials Information, signal and communications theory Mathematics Memory and file management (including protection and security) Memory organisation. Data processing Sciences and techniques of general use Signal and communications theory Software Telecommunications and information theory |
Subtitle | Security and Trust Principles |
Title | Verified indifferentiable hashing into elliptic curves |
Volume | 21 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT8JAEN4YTnrwgRqfpAc9kRroi-4RBKlGbIJguJFt2UaNFkKBRH-9M7vb8tD4ujTNtmm3ndnZmd355iPkrGLaTlRyuV7mrqNbzOS6OxgYuoOox3IURNRBcHLrzvG61k3P7s3ZRgW6ZBJchO9f4kr-I1VoA7kiSvYPks0eCg1wDvKFI0gYjr-S8QO8JEIfEjeeJdEJDFjEQj1KjiSsBjEsYs3NERZmDafjmcoZ_OyPhorfoZgoSrssUgef1xNJk00EDmZOeLONu-wubfrXbXG5xuNn9vqUqZvXaFe7dbG--vYyY_ML_m2rUfeF34y1LEAZFxcfJGpUhqL-_VKSiFhRNBzdMCo9ObVIewrhkO5SCZNODa6ERCvFWrSermRvURMxlaDO5RrZK3NXllGIRX1sKorZWmCn0C-udbPIu1wWpMhZDzEDliUwCCLJXrLgUnS2yab691pVCnaHrPE4T7ZUXKApq5tAU0q9kbblyUYrK7eb7BInVQRtVRE0pQgaKoKWKoImFWGPnF81OpeevtTL_kgWIOmnH2vuk1w8jPkB0RiFIcZL5oBZjkVLJmORHTBqWmGAO9_hISl8_6yjn244JuuGoALB5acTkpuMp_wUHLJJUBA_-wPFBEHl |
link.rule.ids | 315,783,787,4031 |
linkProvider | EBSCOhost |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Verified+indifferentiable+hashing+into+elliptic+curves&rft.jtitle=Journal+of+computer+security&rft.au=BARTHE%2C+Gilles&rft.au=GR%C3%89GOIRE%2C+Benjamin&rft.au=HERAUD%2C+Sylvain&rft.au=OLMEDO%2C+Federico&rft.date=2013&rft.pub=IOS+Press&rft.issn=0926-227X&rft.eissn=1875-8924&rft.volume=21&rft.issue=6&rft.spage=881&rft.epage=917&rft.externalDBID=n%2Fa&rft.externalDocID=28075905 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0926-227X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0926-227X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0926-227X&client=summon |