{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:35:31Z","timestamp":1725593731381},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642219689"},{"type":"electronic","value":"9783642219696"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-21969-6_18","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T19:41:28Z","timestamp":1309290088000},"page":"290-297","source":"Crossref","is-referenced-by-count":5,"title":["On Randomness Extraction in Elliptic Curves"],"prefix":"10.1007","author":[{"given":"Abdoul Aziz","family":"Ciss","sequence":"first","affiliation":[]},{"given":"Djiby","family":"Sow","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1007\/BFb0054851","volume-title":"Algorithmic Number Theory","author":"D. Boneh","year":"1998","unstructured":"Boneh, D.: The decision diffie-hellman problem. In: Buhler, J.P. (ed.) ANTS 1998. LNCS, vol.\u00a01423, pp. 48\u201363. Springer, Heidelberg (1998)"},{"key":"18_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/978-3-642-01001-9_33","volume-title":"Advances in Cryptology - EUROCRYPT 2009","author":"C. Chevalier","year":"2009","unstructured":"Chevalier, C., Fouque, P., Pointcheval, D., Zimmer, S.: Optimal Randomness Extraction from a Diffie-Hellman Element. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol.\u00a05479, pp. 572\u2013589. Springer, Heidelberg (2009)"},{"issue":"6","key":"18_CR3","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"22","author":"W. Diffie","year":"1976","unstructured":"Diffie, W., Hellman, M.: New Directions in Cryptography. IEEE Transactions On Information Theory\u00a022(6), 644\u2013654 (1976)","journal-title":"IEEE Transactions On Information Theory"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-540-28628-8_30","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Y. Dodis","year":"2004","unstructured":"Dodis, Y., Gennaro, R., H\u00e5stad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M.K. (ed.) CRYPTO 2004. LNCS, vol.\u00a03150, pp. 494\u2013510. Springer, Heidelberg (2004)"},{"issue":"177","key":"18_CR5","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1090\/S0273-0979-07-01153-6","volume":"48","author":"H.M. Edwards","year":"2007","unstructured":"Edwards, H.M.: A normal form for elliptic curves. Bulletin of the American Mathematical Society 44\u00a048(177), 393\u2013422 (2007), \n                    \n                      http:\/\/www.ams.org\/bull\/2007-44-03\/S0273-0979-07-01153-6\/home.html","journal-title":"Bulletin of the American Mathematical Society 44"},{"key":"18_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/978-3-540-73074-3_17","volume-title":"Arithmetic of Finite Fields","author":"R.R. Farashahi","year":"2007","unstructured":"Farashahi, R.R., Pellikaan, R.: The Quadratic Extension Extractor for (Hyper)elliptic Curves in Odd Characteristic. In: Carlet, C., Sunar, B. (eds.) WAIFI 2007. LNCS, vol.\u00a04547, pp. 219\u2013236. Springer, Heidelberg (2007)"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s10623-008-9187-5","volume":"94","author":"R.R. Farashahi","year":"2008","unstructured":"Farashahi, R.R., Sidorenko, A., Pellikaan, R.: Extractors for Binary Elliptic Curves. Designs, Codes and Cryptography\u00a094, 171\u2013186 (2008)","journal-title":"Designs, Codes and Cryptography"},{"key":"18_CR8","unstructured":"G\u00fcrel, N.: Extracting bits from coordinates of a point of an elliptic curve, Cryptology ePrint Archive, Report 2005\/324 (2005), \n                    \n                      http:\/\/eprint.iacr.org\/"},{"key":"18_CR9","unstructured":"Handbook of elliptic and hyperelliptic curve cryptography. Discrete Math. Appl. (Boca Raton). Chapman Hall\/CRC, Boca Raton, FL (2006)"},{"issue":"4","key":"18_CR10","doi-asserted-by":"publisher","first-page":"1364","DOI":"10.1137\/S0097539793244708","volume":"28","author":"J. H\u00e5stad","year":"1999","unstructured":"H\u00e5stad, J., Impagliazzo, R., Levin, L., Luby, M.: A pseudorandom generator from any one-way function. SIAM Journal on Computing\u00a028(4), 1364\u20131396 (1999)","journal-title":"SIAM Journal on Computing"},{"key":"18_CR11","volume-title":"Guide to Elliptic Curve Cryptography","author":"N. Koblitz","year":"2004","unstructured":"Koblitz, N.: Guide to Elliptic Curve Cryptography. Springer, Heidelberg (2004)"},{"key":"18_CR12","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/BF02252872","volume":"1","author":"N. Koblitz","year":"1989","unstructured":"Koblitz, N.: Hyperelliptic Cryptosystems. Journal of Cryptology\u00a01, 139\u2013150 (1989)","journal-title":"Journal of Cryptology"},{"key":"18_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/10722028_24","volume-title":"Algorithmic Number Theory","author":"D.R. Kohel","year":"2000","unstructured":"Kohel, D.R., Shparlinski, I.E.: On Exponential Sums and Group Generators for Elliptic Curves over Finite Fields. In: Bosma, W. (ed.) ANTS 2000. LNCS, vol.\u00a01838, pp. 395\u2013404. Springer, Heidelberg (2000)"},{"key":"18_CR14","first-page":"67","volume":"77","author":"R. Shaltiel","year":"2002","unstructured":"Shaltiel, R.: Recent Developments in Explicit Constructions of Extractors. Bulletin of the EATCS\u00a077, 67\u201395 (2002)","journal-title":"Bulletin of the EATCS"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Trevisan, L., Vadhan, S.: Extracting Randomness from Samplable Distributions. In: IEEE Symposium on Foundations of Computer Science, pp. 32\u201342 (2000)","DOI":"10.1109\/SFCS.2000.892063"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 AFRICACRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-21969-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,29]],"date-time":"2019-03-29T15:56:28Z","timestamp":1553874988000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-21969-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642219689","9783642219696"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-21969-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}