RELIC is an Efficient LIbrary for Cryptography ,
Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets, LATINCRYPT, pp.144-161, 2010. ,
DOI : 10.1007/978-3-642-14712-8_9
Curve25519: New Diffie-Hellman speed records, Moti Yung Public Key Cryptography, pp.207-228, 2006. ,
High-speed high-security signatures, Journal of Cryptographic Engineering, vol.30, issue.2, pp.77-89, 2012. ,
DOI : 10.1007/s13389-012-0027-1
Elligator, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516734
Elligator, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516734
ECC2K-130 on Cell CPUs, AFRICACRYPT, pp.225-242, 2010. ,
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, Cryptology ePrint Archive Report, vol.340, 2009. ,
DOI : 10.1007/978-3-642-14623-7_13
Efficient Indifferentiable Hashing into Ordinary Elliptic Curves, Lecture Notes in Computer Science, vol.6223, pp.237-254, 2010. ,
DOI : 10.1007/978-3-642-14623-7_13
SEC 2: Recommended elliptic curve domain parameters, Version 2, 2010. ,
Hashing into Hessian Curves, Lecture Notes in Computer Science, vol.3, issue.2, pp.278-289, 2011. ,
DOI : 10.1006/ffta.1997.0191
Indifferentiable deterministic hashing to elliptic and hyperelliptic curves, Math. Comp, vol.82, issue.281, p.2013 ,
Intel AVX: New frontiers in performance improvement and energy efficiency. White paper ,
Injective Encodings to Elliptic Curves, Lecture Notes in Computer Science, vol.7959, pp.203-218, 2013. ,
DOI : 10.1007/978-3-642-39059-3_14
Indifferentiable Hashing to Barreto???Naehrig Curves, Lecture Notes in Computer Science, vol.7533, pp.1-17, 2012. ,
DOI : 10.1007/978-3-642-33481-8_1
URL : https://hal.archives-ouvertes.fr/hal-01094321
Itoh-Tsujii inversion in standard basis and its application in cryptography and codes, Designs, Codes and Cryptography, vol.25, issue.2, pp.207-216, 2002. ,
DOI : 10.1023/A:1013860532636
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields, IEEE Transactions on Computers, vol.58, issue.10, pp.581411-1420, 2009. ,
DOI : 10.1109/TC.2009.61
A fast algorithm for computing multiplicative inverses in GF(2m) using normal bases, Information and Computation, vol.78, issue.3, pp.171-177, 1988. ,
DOI : 10.1016/0890-5401(88)90024-7
Elliptic curve cryptography (ECC) Brainpool standard curves and curve generation, RFC, vol.5639, 2010. ,
DOI : 10.17487/rfc5639
A Public-Key Encryption Scheme with Pseudo-random Ciphertexts, Lecture Notes in Computer Science, vol.3193, pp.335-351, 2004. ,
DOI : 10.1007/978-3-540-30108-0_21
Two is the fastest prime: lambda coordinates for binary elliptic curves, Journal of Cryptographic Engineering, vol.1, issue.4, pp.3-17, 2014. ,
DOI : 10.1007/s13389-013-0069-z
Construction of Rational Points on Elliptic Curves over Finite Fields, Lecture Notes in Computer Science, vol.4076, pp.510-524, 2006. ,
DOI : 10.1007/11792086_36
Speeding scalar multiplication over binary elliptic curves using the new carry-less multiplication instruction, Journal of Cryptographic Engineering, vol.23, issue.1, pp.187-199, 2011. ,
DOI : 10.1007/s13389-011-0017-8
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings, Financial Cryptography, 2014. ,
DOI : 10.1007/978-3-662-45472-5_10
StegoTorus, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pp.109-120, 2012. ,
DOI : 10.1145/2382196.2382211
Telex: Anticensorship in the network infrastructure, USENIX Security Symposium. USENIX Association, 2011. ,
Space-efficient kleptography without random oracles, Information Hiding, pp.112-129, 2007. ,
Kleptography from standard assumptions and applications, Lecture Notes in Computer Science, vol.6280, pp.271-290, 2010. ,