Login / Signup
Hashing to elliptic curves over highly 2-adic fields $\mathbb{F}_{\!q}$ with O(log(q)) operations in $\mathbb{F}_{\!q}$.
Dmitrii Koshelev
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
elliptic curve
scalar multiplication
special case
data structure
vertex set
elliptic curve cryptography
multi dimensional
data distribution
diffie hellman