{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T17:23:11Z","timestamp":1725988991712},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988771"},{"type":"electronic","value":"9783319988788"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98878-8_21","type":"book-chapter","created":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T19:15:12Z","timestamp":1535570112000},"page":"224-235","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Encoding for the Theta Model of\u00a0Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Nafissatou","family":"Diarra","sequence":"first","affiliation":[]},{"given":"Emmanuel","family":"Fouotsa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,30]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: Gligor, V., Yung, M. (eds.) ACM CCS (2013)","DOI":"10.1145\/2508859.2516734"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/3-540-44828-4_5","volume-title":"Applied Algebra, Algebraic Algorithms and Error-Correcting Codes","author":"O Billet","year":"2003","unstructured":"Billet, O., Joye, M.: The Jacobi model of an elliptic curve and side-channel analysis. In: Fossorier, M., H\u00f8holdt, T., Poli, A. (eds.) AAECC 2003. LNCS, vol. 2643, pp. 34\u201342. Springer, Heidelberg (2003). \nhttps:\/\/doi.org\/10.1007\/3-540-44828-4_5"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-44647-8_13","volume-title":"Advances in Cryptology\u2014CRYPTO 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213\u2013229. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-44647-8_13"},{"issue":"4","key":"21_CR4","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1016\/0196-8858(86)90023-0","volume":"7","author":"DV Chudnovsky","year":"1986","unstructured":"Chudnovsky, D.V., Chudnovky, G.V.: Sequences of numbers generated by addition in formal groups and new primality and factorization tests. Adv. Appl. Math. 7(4), 385\u2013434 (1986)","journal-title":"Adv. Appl. Math."},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/978-3-642-19074-2_22","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"J Devigne","year":"2011","unstructured":"Devigne, J., Joye, M.: Binary huff curves. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 340\u2013355. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-19074-2_22"},{"issue":"3","key":"21_CR6","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s13370-013-0203-1","volume":"26","author":"O Diao","year":"2015","unstructured":"Diao, O., Fouotsa, E.: Arithmetic of the level four theta model of elliptic curves. Afrika Mathematica 26(3), 283\u2013301 (2015)","journal-title":"Afrika Mathematica"},{"key":"21_CR7","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bull. Am. Math. Soc. 44, 393\u2013422 (2007). \nhttp:\/\/www.ams.org\/bull\/2007-44-03\/S0273-0979-07-01153-6\/home.html"},{"key":"21_CR8","unstructured":"Diarra, N., Sow, D., Ould Cheikh Khlil, A.Y.: On indifferentiable deterministic hashing into elliptic curves. Eur. J. Pure Appl. Math. 10(2), 363\u2013391 (2017). (MathScinet: MR3607082) (ZentralBlattMath: Zbl 06701281)"},{"key":"21_CR9","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s00009-017-0840-y","volume":"14","author":"E Fouotsa","year":"2017","unstructured":"Fouotsa, E., Diao, O.: A theta model for elliptic curves. Mediterr. J. Math. 14, 65 (2017). \nhttps:\/\/doi.org\/10.1007\/s00009-017-0840-y","journal-title":"Mediterr. J. Math."},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"278","DOI":"10.1007\/978-3-642-21969-6_17","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2011","author":"RR Farashahi","year":"2011","unstructured":"Farashahi, R.R.: Hashing into Hessian curves. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 278\u2013289. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-21969-6_17"},{"issue":"281","key":"21_CR11","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1090\/S0025-5718-2012-02606-8","volume":"82","author":"RR Farashahi","year":"2013","unstructured":"Farashahi, R.R., Fouque, P.-A., Shparlinski, I.E., Tibouchi, M., Voloch, J.F.: Indifferentiable deterministic hashing to elliptic and hyperelliptic curves. Math. Comput. 82(281), 491\u2013512 (2013)","journal-title":"Math. Comput."},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-642-14712-8_5","volume-title":"Progress in Cryptology \u2013 LATINCRYPT 2010","author":"P-A Fouque","year":"2010","unstructured":"Fouque, P.-A., Tibouchi, M.: Estimating the size of the image of deterministic hash functions to elliptic curves. In: Abdalla, M., Barreto, P.S.L.M. (eds.) LATINCRYPT 2010. LNCS, vol. 6212, pp. 81\u201391. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-14712-8_5"},{"key":"21_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-642-03356-8_18","volume-title":"Advances in Cryptology - CRYPTO 2009","author":"T Icart","year":"2009","unstructured":"Icart, T.: How to hash into elliptic curves. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 303\u2013316. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-03356-8_18"},{"key":"21_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-44709-1_11","volume-title":"Cryptographic Hardware and Embedded Systems\u2014CHES 2001","author":"NP Smart","year":"2001","unstructured":"Smart, N.P.: The Hessian form of an elliptic curve. In: Ko\u00e7, \u00c7.K., Naccache, D., Paar, C. (eds.) CHES 2001. LNCS, vol. 2162, pp. 118\u2013125. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-44709-1_11"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1007\/11792086_36","volume-title":"Algorithmic Number Theory","author":"A Shallue","year":"2006","unstructured":"Shallue, A., van de Woestijne, C.E.: Construction of rational points on elliptic curves over finite fields. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 510\u2013524. Springer, Heidelberg (2006). \nhttps:\/\/doi.org\/10.1007\/11792086_36"},{"key":"21_CR16","series-title":"Discrete Mathematics and Applications","doi-asserted-by":"publisher","DOI":"10.1201\/9781420071474","volume-title":"Elliptic Curves. Number Theory and Cryptography","author":"LC Washington","year":"2008","unstructured":"Washington, L.C.: Elliptic Curves. Number Theory and Cryptography. Discrete Mathematics and Applications. Chapman and Hall, Boca Raton (2008)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Innovations and Interdisciplinary Solutions for Underserved Areas"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98878-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,8,29]],"date-time":"2018-08-29T19:24:17Z","timestamp":1535570657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98878-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988771","9783319988788"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98878-8_21","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}