{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T05:03:05Z","timestamp":1764997385753,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T00:00:00Z","timestamp":1623974400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100007493","name":"Fondation Math\u00e9matique Jacques Hadamard","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100007493","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cryptogr. Commun."],"published-print":{"date-parts":[[2021,7]]},"DOI":"10.1007\/s12095-021-00478-y","type":"journal-article","created":{"date-parts":[[2021,6,18]],"date-time":"2021-06-18T06:02:39Z","timestamp":1623996159000},"page":"479-494","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Hashing to elliptic curves of j-invariant 1728"],"prefix":"10.1007","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4796-8989","authenticated-orcid":false,"given":"Dmitrii","family":"Koshelev","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,18]]},"reference":[{"key":"478_CR1","unstructured":"Sakemi, Y., Kobayashi, T., Saito, T., Wahby, R.: Pairing-friendly curves IETF Secretariat (2020)"},{"key":"478_CR2","doi-asserted-by":"crossref","unstructured":"El Mrabet, N., Joye, M.: Guide to pairing-based cryptography \u2014 New York.: Chapman and Hall (2016)","DOI":"10.1201\/9781315370170"},{"key":"478_CR3","unstructured":"Faz-Hernandez, A., et al.: Hashing to elliptic curves IETF Secretariat (2020)"},{"issue":"3","key":"478_CR4","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1137\/S0097539701398521","volume":"32","author":"D Boneh","year":"2003","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. SIAM J. Comput. 32(3), 586\u2013615 (2003)","journal-title":"SIAM J. Comput."},{"key":"478_CR5","doi-asserted-by":"crossref","unstructured":"Icart, T.: How to hash into elliptic curves. 29th Annual international cryptology conference, p. 303\u2013316 (2009)","DOI":"10.1007\/978-3-642-03356-8_18"},{"key":"478_CR6","doi-asserted-by":"crossref","unstructured":"Bernstein, D., Hamburg, M., Krasnova, A., Lange, T.: Elligator: Elliptic-curve points indistinguishable from uniform random strings. Conference on Computer & Commun Security, pp. 967\u2013980 (2013)","DOI":"10.1145\/2508859.2516734"},{"key":"478_CR7","doi-asserted-by":"publisher","first-page":"293","DOI":"10.4064\/aa117-3-7","volume":"117","author":"M Ska\u0142ba","year":"2005","unstructured":"Ska\u0142ba, M.: Points on elliptic curves over finite fields. Acta Arithmetica 117, 293\u2013301 (2005)","journal-title":"Acta Arithmetica"},{"key":"478_CR8","unstructured":"Mordell, L.: Diophantine equations \u2014 London.: Academic Press (1969)"},{"key":"478_CR9","doi-asserted-by":"crossref","unstructured":"Shallue, A., van de Woestijne, C.: Construction of rational points on elliptic curves over finite fields. 7th International Algorithmic Number Theory Symposium, P. 510\u2013524 (2006)","DOI":"10.1007\/11792086_36"},{"key":"478_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73725-4","volume-title":"Rational algebraic curves: A computer algebra approach","author":"J Sendra","year":"2008","unstructured":"Sendra, J., Winkler, F., P\u00e9rez-D\u00edaz, S.: Rational algebraic curves: A computer algebra approach. Springer, Berlin (2008)"},{"issue":"1","key":"478_CR11","doi-asserted-by":"crossref","first-page":"97","DOI":"10.4171\/dm\/140","volume":"8","author":"G Van der Geer","year":"2003","unstructured":"Van der Geer, G., Katsura, T.: On the height of Calabi\u2013Yau varieties in positive characteristic. Doc. Math. 8(1), 97\u2013113 (2003)","journal-title":"Doc. Math."},{"issue":"1","key":"478_CR12","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s13163-009-0010-2","volume":"23","author":"M Andreatta","year":"2010","unstructured":"Andreatta, M., Wi\u015bniewski, J.: On the Kummer construction. Revista Matem\u00e1tica Complutense 23(1), 191\u2013215 (2010)","journal-title":"Revista Matem\u00e1tica Complutense"},{"issue":"8","key":"478_CR13","doi-asserted-by":"publisher","first-page":"1965","DOI":"10.1016\/j.jnt.2008.09.010","volume":"129","author":"S Cynk","year":"2009","unstructured":"Cynk, S., Sch\u00fctt, M.: Generalised Kummer constructions and Weil restrictions. J. Num. Theory 129(8), 1965\u20131975 (2009)","journal-title":"J. Num. Theory"},{"issue":"2","key":"478_CR14","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/s13163-010-0049-0","volume":"24","author":"M Donten","year":"2011","unstructured":"Donten, M.: On Kummer 3-folds. Revista Matem\u00e1tica Complutense 24(2), 465\u2013492 (2011)","journal-title":"Revista Matem\u00e1tica Complutense"},{"key":"478_CR15","doi-asserted-by":"crossref","unstructured":"Koll\u00e1r, J., Larsen, M.: Quotients of Calabi\u2013Yau varieties. Algebra, arithmetic, and geometry. Birkh\u00e4user Boston, pp. 179\u2013211 (2009)","DOI":"10.1007\/978-0-8176-4747-6_6"},{"key":"478_CR16","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5406-3","volume-title":"Higher-dimensional algebraic geometry","author":"O Debarre","year":"2001","unstructured":"Debarre, O.: Higher-dimensional algebraic geometry. Springer, Berlin (2001)"},{"key":"478_CR17","first-page":"273","volume":"218","author":"C Voisin","year":"1993","unstructured":"Voisin, C.: Miroir set involutions sur les surfaces K3. Ast\u00e9risque 218, 273\u2013323 (1993)","journal-title":"Ast\u00e9risque"},{"issue":"4","key":"478_CR18","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1353\/ajm.2005.0025","volume":"127","author":"F Bogomolov","year":"2005","unstructured":"Bogomolov, F., Tschinkel, Y.: Rational curves and points on K3 surfaces. Am. J. Math. 127(4), 825\u2013835 (2005)","journal-title":"Am. J. Math."},{"key":"478_CR19","doi-asserted-by":"crossref","unstructured":"Brier, E., Coron, J.-S., Icart, T., Madore, D., Randriam, H., Tibouchi, M.: Efficient indifferentiable hashing into ordinary elliptic curves. 30th Annual Cryptology Conference, pp. 237\u2013254 (2010)","DOI":"10.1007\/978-3-642-14623-7_13"},{"issue":"12","key":"478_CR20","first-page":"919","volume":"314","author":"J-F Mestre","year":"1992","unstructured":"Mestre, J. -F.: Rang de courbes elliptiques d\u2019invariant donn\u00e9. Comptes Rendus de l\u2019Acad\u00e9mie des Sciences - Series I - Mathematics 314 (12), 919\u2013922 (1992)","journal-title":"Comptes Rendus de l\u2019Acad\u00e9mie des Sciences - Series I - Mathematics"},{"key":"478_CR21","doi-asserted-by":"crossref","unstructured":"Satg\u00e9, P.: Une construction de courbes k-rationnelles sur les surfaces de Kummer d\u2019un produit de courbes de genre 1. Rational points on algebraic varieties. Birkh\u00e4user Basel, pp. 313\u2013334 (2001)","DOI":"10.1007\/978-3-0348-8368-9_12"},{"issue":"2","key":"478_CR22","first-page":"97","volume":"55","author":"M Ulas","year":"2007","unstructured":"Ulas, M.: Rational points on certain hyperelliptic curves over finite fields. Bulletin of the Polish Academy of Sciences. Mathematics 55(2), 97\u2013104 (2007)","journal-title":"Mathematics"},{"issue":"4","key":"478_CR23","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1155\/S107379289300011X","volume":"1993","author":"M Kuwata","year":"1993","unstructured":"Kuwata, M., Wang, L.: Topology of rational points on isotrivial elliptic surfaces. Int. Math. Res. Not. 1993(4), 113\u2013123 (1993)","journal-title":"Int. Math. Res. Not."},{"key":"478_CR24","doi-asserted-by":"crossref","unstructured":"Wahby, R., Boneh, D.: Fast and simple constant-time hashing to the BLS12-381 elliptic curve. IACR Trans. on Crypto Hardware and Embedded Systems, pp. 154\u2013179 (2019)","DOI":"10.46586\/tches.v2019.i4.154-179"},{"key":"478_CR25","doi-asserted-by":"crossref","unstructured":"Kachisa, E., Schaefer, E., Scott, M.: Constructing Brezing\u2013Weng pairing-friendly elliptic curves using elements in the cyclotomic field. 2nd Internat, Conf. on Pairing-Based Crypto, pp. 126\u2013135 (2008)","DOI":"10.1007\/978-3-540-85538-5_9"},{"key":"478_CR26","unstructured":"Barbulescu, R., El Mrabet, N., Ghammam, L.: A taxonomy of pairings, their security, their complexity IACR Cryptology ePrint Archive (2019)"},{"key":"478_CR27","doi-asserted-by":"crossref","unstructured":"Barbulescu, R., Duquesne, S.: Updating key size estimations for pairings. J. Cryptol. pp. 1\u201339 (2018)","DOI":"10.1007\/s00145-018-9280-5"},{"key":"478_CR28","doi-asserted-by":"crossref","unstructured":"Ghammam, L., Fouotsa, E.: Adequate elliptic curves for computing the product of n pairings. International workshop on the arithmetic of finite fields, pp. 36\u201353 (2016)","DOI":"10.1007\/978-3-319-55227-9_3"},{"key":"478_CR29","unstructured":"Gorchinskiy, S., Shramov, C.: Unramified Brauer group and its applications \u2014 Providence.: American Mathematical Society (2018)"},{"key":"478_CR30","volume-title":"Handbook of elliptic and hyperelliptic curve cryptography","author":"H Cohen","year":"2006","unstructured":"Cohen, H., Frey, G., Avanzi, R., Doche, C., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of elliptic and hyperelliptic curve cryptography. Chapman & Hall, Boca Raton (2006)"},{"key":"478_CR31","doi-asserted-by":"crossref","unstructured":"Milne, J.: Abelian varieties. Arithmetic geometry, pp. 103\u2013150 (1986)","DOI":"10.1007\/978-1-4613-8655-1_5"},{"key":"478_CR32","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3849-0","volume-title":"Algebraic geometry","author":"R Hartshorne","year":"1977","unstructured":"Hartshorne, R.: Algebraic geometry. Springer, Berlin (1977)"},{"key":"478_CR33","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0094399","volume-title":"The geometry of some special arithmetic quotients","author":"B Hunt","year":"1996","unstructured":"Hunt, B.: The geometry of some special arithmetic quotients. Springer, Berlin (1996)"},{"key":"478_CR34","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316594193","volume-title":"Lectures on K3 surfaces","author":"D Huybrechts","year":"2016","unstructured":"Huybrechts, D.: Lectures on K3 surfaces. Cambridge University Press, Cambridge (2016)"},{"key":"478_CR35","doi-asserted-by":"crossref","unstructured":"Ulmer, D.: Elliptic curves over function fields. Arithmetic of L-functions, pp. 211\u2013280 (2011)","DOI":"10.1090\/pcms\/018\/09"},{"key":"478_CR36","doi-asserted-by":"crossref","unstructured":"Shioda, T.: Supersingular K3 surfaces. Algebraic Geometry, pp. 564\u2013591 (1979)","DOI":"10.1007\/BFb0066664"},{"key":"478_CR37","doi-asserted-by":"publisher","DOI":"10.1515\/9781400847419","volume-title":"Algebraic curves over a finite field","author":"J Hirschfeld","year":"2008","unstructured":"Hirschfeld, J., Korchm\u00e1ros, G., Torres, F.: Algebraic curves over a finite field. Princeton University Press, Princeton (2008)"},{"key":"478_CR38","doi-asserted-by":"crossref","unstructured":"Gaudry, P., Schost, \u00c9.: On the invariants of the quotients of the Jacobian of a curve of genus 2. 14th Inter. Symp. on Applied Algebra, Algebraic Algorithms, and Error-Correct Codes, pp. 373\u2013386 (2001)","DOI":"10.1007\/3-540-45624-4_39"},{"issue":"2","key":"478_CR39","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1134\/S0032946019020029","volume":"55","author":"D Koshelev","year":"2019","unstructured":"Koshelev, D.: Non-split toric codes. Probl. Inf. Transm. 55(2), 124\u2013144 (2019)","journal-title":"Probl. Inf. Transm."},{"key":"478_CR40","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-09494-6","volume-title":"The arithmetic of elliptic curves","author":"J Silverman","year":"2009","unstructured":"Silverman, J.: The arithmetic of elliptic curves. Springer, New York (2009)"},{"key":"478_CR41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843","volume-title":"Mathematics of public key cryptography","author":"S Galbraith","year":"2012","unstructured":"Galbraith, S.: Mathematics of public key cryptography. Cambridge University Press, New York (2012)"},{"key":"478_CR42","unstructured":"Koshelev, D. Magma code. https:\/\/github.com\/dishport\/Hashing-to-elliptic-curves-of-j-invariant-1728"},{"key":"478_CR43","doi-asserted-by":"crossref","unstructured":"Aubry, Y., Perret, M.: A Weil theorem for singular curves. Arithmetic, Geometry and Coding Theory (AGCT-4), pp. 1\u20137 (1993)","DOI":"10.1515\/9783110811056.1"},{"key":"478_CR44","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-2103-4","volume-title":"A classical introduction to modern number theory","author":"K Ireland","year":"1990","unstructured":"Ireland, K., Rosen, M.: A classical introduction to modern number theory. Springer, New York (1990)"},{"key":"478_CR45","doi-asserted-by":"crossref","unstructured":"Fouque, P.-A., Tibouchi, M.: Estimating the size of the image of deterministic hash functions to elliptic curves. 1st Inter, Conference on Crypto and Information Security in Latin America, pp. 81\u201391 (2010)","DOI":"10.1007\/978-3-642-14712-8_5"}],"container-title":["Cryptography and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00478-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12095-021-00478-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12095-021-00478-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,5]],"date-time":"2023-11-05T02:11:29Z","timestamp":1699150289000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12095-021-00478-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,18]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2021,7]]}},"alternative-id":["478"],"URL":"https:\/\/doi.org\/10.1007\/s12095-021-00478-y","relation":{},"ISSN":["1936-2447","1936-2455"],"issn-type":[{"type":"print","value":"1936-2447"},{"type":"electronic","value":"1936-2455"}],"subject":[],"published":{"date-parts":[[2021,6,18]]},"assertion":[{"value":"16 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}