all InfoSec news
Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$
Feb. 7, 2023, 2:06 p.m. |
IACR News www.iacr.org
ePrint Report: Hashing to elliptic curves over highly $2$-adic fields $\mathbb{F}_{\!q}$ with $O(\log(q))$ operations in $\mathbb{F}_{\!q}$
Dmitrii Koshelev
The current article provides a new deterministic hash function $\mathcal{H}$ to almost any elliptic curve $E$ over a finite field $\mathbb{F}_{\!q}$, having an $\mathbb{F}_{\!q}$-isogeny of degree $3$. Since $\mathcal{H}$ just has to compute a certain Lucas sequence element, its complexity always equals $O(\log(q))$ operations in $\mathbb{F}_{\!q}$ with a small constant hidden in $O$. In comparison, whenever $q \equiv 1 \ (\mathrm{mod} \ …
article complexity compute current elliptic eprint report function hash hash function hashing log operations report
More from www.iacr.org / IACR News
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Director, Data Security Lead
@ Mastercard | London, England (Angel Lane)
Security Officer L1
@ NTT DATA | Texas, United States of America
Sr. Staff Application Security Engineer
@ Aurora Innovation | Seattle, WA
Senior Penetration Testing Engineer
@ WPP | Chennai
Cyber Security - Senior Software Developer in Test
@ BlackBerry | Bengaluru, Residency Road