{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T01:36:45Z","timestamp":1766281005087},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642010002"},{"type":"electronic","value":"9783642010019"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01001-9_33","type":"book-chapter","created":{"date-parts":[[2009,4,15]],"date-time":"2009-04-15T08:38:25Z","timestamp":1239784705000},"page":"572-589","source":"Crossref","is-referenced-by-count":17,"title":["Optimal Randomness Extraction from a Diffie-Hellman Element"],"prefix":"10.1007","author":[{"given":"C\u00e9line","family":"Chevalier","sequence":"first","affiliation":[]},{"given":"Pierre-Alain","family":"Fouque","sequence":"additional","affiliation":[]},{"given":"David","family":"Pointcheval","sequence":"additional","affiliation":[]},{"given":"S\u00e9bastien","family":"Zimmer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"432","DOI":"10.1007\/978-3-540-30539-2_31","volume-title":"Advances in Cryptology - ASIACRYPT 2004","author":"T. Baign\u00e8res","year":"2004","unstructured":"Baign\u00e8res, T., Junod, P., Vaudenay, S.: How far can we go beyond linear cryptanalysis? In: Lee, P.J. (ed.) ASIACRYPT 2004. LNCS, vol.\u00a03329, pp. 432\u2013450. Springer, Heidelberg (2004)"},{"key":"33_CR2","first-page":"62","volume-title":"ACM CCS 1993","author":"M. Bellare","year":"1993","unstructured":"Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Ashby, V. (ed.) ACM CCS 1993, pp. 62\u201373. ACM Press, New York (1993)"},{"key":"33_CR3","doi-asserted-by":"publisher","first-page":"71","DOI":"10.2307\/2373048","volume":"88","author":"E. Bombieri","year":"1966","unstructured":"Bombieri, E.: On exponential sums in finite fields. American Journal of Mathematics\u00a088, 71\u2013105 (1966)","journal-title":"American Journal of Mathematics"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D. Boneh","year":"1998","unstructured":"Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 48\u201363. Springer, Heidelberg (1998)"},{"key":"33_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/3-540-44647-8_12","volume-title":"Advances in Cryptology - CRYPTO 2001","author":"D. Boneh","year":"2001","unstructured":"Boneh, D., Shparlinski, I.E.: On the unpredictability of bits of the elliptic curve diffie\u2013hellman scheme. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol.\u00a02139, pp. 201\u2013212. Springer, Heidelberg (2001)"},{"key":"33_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/3-540-68697-5_11","volume-title":"Advances in Cryptology - CRYPTO \u201996","author":"D. Boneh","year":"1996","unstructured":"Boneh, D., Venkatesan, R.: Hardness of computing the most significant bits of secret keys in diffie-hellman and related schemes. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol.\u00a01109, pp. 129\u2013142. Springer, Heidelberg (1996)"},{"key":"33_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"466","DOI":"10.1007\/978-3-540-74143-5_26","volume-title":"Advances in Cryptology - CRYPTO 2007","author":"D.R.L. Brown","year":"2007","unstructured":"Brown, D.R.L., Gj\u00f8steen, K.: A security analysis of the NIST SP 800-90 elliptic curve random number generator. In: Menezes, A. (ed.) CRYPTO 2007. LNCS, vol.\u00a04622, pp. 466\u2013481. Springer, Heidelberg (2007)"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1007\/s11856-000-1270-1","volume":"120","author":"R. Canetti","year":"2000","unstructured":"Canetti, R., Friedlander, J., Konyagin, S., Larsen, M., Lieman, D., Shparlinski, I.: On the Statistical Properties of Diffie-Hellman Distributions. Israel Journal of Mathematics\u00a0120, 23\u201346 (2000)","journal-title":"Israel Journal of Mathematics"},{"key":"33_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/BFb0055717","volume-title":"Advances in Cryptology - CRYPTO \u201998","author":"R. Cramer","year":"1998","unstructured":"Cramer, R., Shoup, V.: A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk, H. (ed.) CRYPTO 1998. LNCS, vol.\u00a01462, pp. 13\u201325. Springer, Heidelberg (1998)"},{"issue":"6","key":"33_CR10","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions on Information Theory"},{"key":"33_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/3-540-39568-7_2","volume-title":"Advances in Cryptology","author":"T. El Gamal","year":"1985","unstructured":"El Gamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol.\u00a0196, pp. 10\u201318. Springer, Heidelberg (1985)"},{"key":"33_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"396","DOI":"10.1007\/3-540-39799-X_28","volume-title":"Advances in Cryptology","author":"T. El Gamal","year":"1986","unstructured":"El Gamal, T.: On computing logarithms over finite fields. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol.\u00a0218, pp. 396\u2013402. Springer, Heidelberg (1986)"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/11787006_21","volume-title":"Automata, Languages and Programming","author":"P.-A. Fouque","year":"2006","unstructured":"Fouque, P.-A., Pointcheval, D., Stern, J., Zimmer, S.: Hardness of distinguishing the MSB or LSB of secret keys in diffie-hellman schemes. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) ICALP 2006. LNCS, vol.\u00a04052, pp. 240\u2013251. Springer, Heidelberg (2006)"},{"key":"33_CR14","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/1368310.1368317","volume-title":"ASIACCS","author":"P.-A. Fouque","year":"2008","unstructured":"Fouque, P.-A., Pointcheval, D., Zimmer, S.: HMAC is a randomness extractor and applications to TLS. In: Abe, M., Gligor, V.D. (eds.) ASIACCS, pp. 21\u201332. ACM Press, New York (2008)"},{"key":"33_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/978-3-540-24676-3_22","volume-title":"Advances in Cryptology - EUROCRYPT 2004","author":"R. Gennaro","year":"2004","unstructured":"Gennaro, R., Krawczyk, H., Rabin, T.: Secure hashed diffie-hellman over non-DDH\u00a0groups. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol.\u00a03027, pp. 361\u2013381. Springer, Heidelberg (2004)"},{"unstructured":"G\u00fcrel, N.: Extracting bits from coordinates of a point of an elliptic curve. Cryptology ePrint Archive, Report 2005\/324 (2005), http:\/\/eprint.iacr.org\/","key":"33_CR16"},{"issue":"4","key":"33_CR17","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J. H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L.A., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing\u00a028(4), 1364\u20131396 (1999)","journal-title":"SIAM Journal on Computing"},{"issue":"2","key":"33_CR18","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1093\/qjmath\/51.2.221","volume":"51","author":"D.R. Heath-Brown","year":"2000","unstructured":"Heath-Brown, D.R., Konyagin, S.: New bounds for Gauss sums derived from k th powers, and for Heilbronn\u2019s exponential sum. Q. J. Math.\u00a051(2), 221\u2013235 (2000)","journal-title":"Q. J. Math."},{"key":"33_CR19","first-page":"248","volume-title":"Proc. of the 30th FOCS","author":"R. Impagliazzo","year":"1989","unstructured":"Impagliazzo, R., Zuckerman, D.: How to recycle random bits. In: Proc. of the 30th FOCS, pp. 248\u2013253. IEEE, New York (1989)"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1007\/978-3-540-85174-5_5","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"D. Jetchev","year":"2008","unstructured":"Jetchev, D., Venkatesan, R.: Bits security of the elliptic curve diffie\u2013hellman secret keys. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 75\u201392. Springer, Heidelberg (2008)"},{"key":"33_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/10722028_24","volume-title":"Algorithmic Number Theory","author":"D.R. Kohel","year":"2000","unstructured":"Kohel, D.R., Shparlinski, I.E.: On exponential sums and group generators for elliptic curves over finite fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 395\u2013404. Springer, Heidelberg (2000)"},{"key":"33_CR22","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511542930","volume-title":"Character Sums With Exponential Functions and Their Applications","author":"S.V. Konyagin","year":"1999","unstructured":"Konyagin, S.V., Shparlinski, I.: Character Sums With Exponential Functions and Their Applications. Cambridge University Press, Cambridge (1999)"},{"key":"33_CR23","first-page":"458","volume-title":"38th FOCS","author":"M. Naor","year":"1997","unstructured":"Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. In: 38th FOCS, pp. 458\u2013467. IEEE Computer Society Press, Los Alamitos (1997)"},{"unstructured":"NIST. Recommendation for Random Number Generation Using Deterministic Random Bit Generators. NIST Special Publications 800-90 (March 2007), http:\/\/csrc.nist.gov\/publications\/PubsSPs.html","key":"33_CR24"},{"key":"33_CR25","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139165464","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V. Shoup","year":"2005","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra. Cambridge University Press, Cambridge (2005)"},{"key":"33_CR26","doi-asserted-by":"crossref","DOI":"10.4324\/9780203484029","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"L. Washington","year":"2003","unstructured":"Washington, L.: Elliptic Curves: Number Theory and Cryptography. CRC Press, Boca Raton (2003)"},{"unstructured":"Weil, A.: Sur les courbes alg\u00e9briques et les vari\u00e9t\u00e9s qui s\u2019en d\u00e9duisent. In: Actualit\u00e9s scientifiques et industrielles, Publications de l\u2019institut de Math\u00e9matique de l\u2019universit\u00e9 de Strasbourg, vol.\u00a01041, Paris, Hermann (1948)","key":"33_CR27"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology - EUROCRYPT 2009"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01001-9_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,4]],"date-time":"2021-10-04T00:55:35Z","timestamp":1633308935000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01001-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642010002","9783642010019"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01001-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}