{"id":"https://openalex.org/W2791607020","doi":"https://doi.org/10.1007/978-3-319-75160-3_9","title":"Hashing into Twisted Jacobi Intersection Curves","display_name":"Hashing into Twisted Jacobi Intersection Curves","publication_year":2018,"publication_date":"2018-01-01","ids":{"openalex":"https://openalex.org/W2791607020","doi":"https://doi.org/10.1007/978-3-319-75160-3_9","mag":"2791607020"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-75160-3_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"book-chapter","type_crossref":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018815272","display_name":"Xiaoyang He","orcid":"https://orcid.org/0000-0002-8651-0145"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaoyang He","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035232919","display_name":"Wei Yu","orcid":"https://orcid.org/0000-0002-9015-9351"},"institutions":[{"id":"https://openalex.org/I4210156404","display_name":"Institute of Information Engineering","ror":"https://ror.org/04r53se39","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210156404"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"government","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Yu","raw_affiliation_strings":["State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210156404","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100676186","display_name":"Kunpeng Wang","orcid":"https://orcid.org/0000-0002-9412-7867"},"institutions":[{"id":"https://openalex.org/I4210126530","display_name":"Data Assurance and Communication Security","ror":"https://ror.org/02z2gfm30","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210126530","https://openalex.org/I4210156404"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kunpeng Wang","raw_affiliation_strings":["Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Data Assurance and Communication Security Research Center, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210126530"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392,"provenance":"doaj"},"apc_paid":null,"fwci":0.539,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":1,"citation_normalized_percentile":{"value":0.526121,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":62,"max":70},"biblio":{"volume":null,"issue":null,"first_page":"117","last_page":"138"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11693","display_name":"Applications of Elliptic Curve Cryptography in Security","score":0.9953,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image Encryption Techniques","score":0.9947,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Digital Image Watermarking Techniques","score":0.9927,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/robust-hashing","display_name":"Robust Hashing","score":0.525958},{"id":"https://openalex.org/keywords/information-embedding","display_name":"Information Embedding","score":0.517928},{"id":"https://openalex.org/keywords/reversible-data-embedding","display_name":"Reversible Data Embedding","score":0.505934},{"id":"https://openalex.org/keywords/elliptic-curves","display_name":"Elliptic Curves","score":0.504018}],"concepts":[{"id":"https://openalex.org/C64543145","wikidata":"https://www.wikidata.org/wiki/Q162942","display_name":"Intersection (aeronautics)","level":2,"score":0.7605333},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.64636517},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.5354533},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.48373845},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.45595104},{"id":"https://openalex.org/C48372109","wikidata":"https://www.wikidata.org/wiki/Q3913","display_name":"Binary number","level":2,"score":0.44652018},{"id":"https://openalex.org/C67923128","wikidata":"https://www.wikidata.org/wiki/Q1481893","display_name":"Jacobi method","level":2,"score":0.4376437},{"id":"https://openalex.org/C118615104","wikidata":"https://www.wikidata.org/wiki/Q121416","display_name":"Discrete mathematics","level":1,"score":0.40563497},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.36427236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.33665046},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3263918},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.29480386},{"id":"https://openalex.org/C28826006","wikidata":"https://www.wikidata.org/wiki/Q33521","display_name":"Applied mathematics","level":1,"score":0.2173231},{"id":"https://openalex.org/C94375191","wikidata":"https://www.wikidata.org/wiki/Q11205","display_name":"Arithmetic","level":1,"score":0.14030343},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-75160-3_9","pdf_url":null,"source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319965","https://openalex.org/P4310319900"],"host_organization_lineage_names":["Springer Nature","Springer Science+Business Media"],"type":"book series"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.83,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":34,"referenced_works":["https://openalex.org/W1487143383","https://openalex.org/W1488467418","https://openalex.org/W1518147993","https://openalex.org/W1548023999","https://openalex.org/W1576892942","https://openalex.org/W1584499213","https://openalex.org/W1608511627","https://openalex.org/W1760090598","https://openalex.org/W1784604810","https://openalex.org/W1788452017","https://openalex.org/W1802354148","https://openalex.org/W182971684","https://openalex.org/W1871076680","https://openalex.org/W2009129512","https://openalex.org/W2029879096","https://openalex.org/W203500824","https://openalex.org/W2068273340","https://openalex.org/W2080206293","https://openalex.org/W2105271809","https://openalex.org/W2126484007","https://openalex.org/W2130708931","https://openalex.org/W2131559681","https://openalex.org/W2133432179","https://openalex.org/W2152924492","https://openalex.org/W2163793314","https://openalex.org/W2211728331","https://openalex.org/W2244448351","https://openalex.org/W2317188011","https://openalex.org/W2378537248","https://openalex.org/W2395469959","https://openalex.org/W2499458149","https://openalex.org/W25568184","https://openalex.org/W2963396100","https://openalex.org/W3039948875"],"related_works":["https://openalex.org/W67445448","https://openalex.org/W4293864700","https://openalex.org/W3110702597","https://openalex.org/W2770150859","https://openalex.org/W2326878701","https://openalex.org/W2184228419","https://openalex.org/W2125620709","https://openalex.org/W2110441383","https://openalex.org/W2073713056","https://openalex.org/W2045932760"],"abstract_inverted_index":{"By":[0],"generalizing":[1],"Jacobi":[2,19,28,67,82],"intersection":[3,20,29,68,83],"curves":[4,30],"introduced":[5],"by":[6,136],"D.":[7],"V.":[8,12],"Chudnovsky":[9],"and":[10,40],"G.":[11],"Chudnovsky,":[13],"Feng":[14],"et":[15],"al.":[16],"proposed":[17,50],"twisted":[18,66,81],"curves,":[21],"which":[22],"contain":[23],"more":[24,121],"elliptic":[25],"curves.":[26,69,84],"Twisted":[27],"own":[31],"efficient":[32,122],"arithmetics":[33],"with":[34],"regard":[35],"to":[36,43,62,80,89],"their":[37],"group":[38],"law":[39],"are":[41,72,86,120],"resistant":[42],"timing":[44],"attacks.":[45],"In":[46,114],"this":[47],"paper,":[48],"we":[49,127],"two":[51,87],"hash":[52],"functions":[53,71],"indifferentiable":[54],"from":[55,77],"a":[56],"random":[57],"oracle,":[58],"mapping":[59],"binary":[60],"messages":[61],"rational":[63],"points":[64],"on":[65,74,101],"Both":[70],"based":[73],"deterministic":[75],"encodings":[76,135],"$$\\mathbb":[78,102],"{F}_q$$":[79,103],"There":[85],"ways":[88],"construct":[90],"such":[91],"encodings:":[92],"(1)":[93],"utilizing":[94],"the":[95,129],"algorithm":[96,110],"of":[97,131,133],"computing":[98],"cube":[99],"roots":[100],"when":[104,111],"$$3\\,|q+1$$":[105],";":[106],"(2)":[107],"using":[108],"Shallue-Woestijne-Ulas":[109],"$$4\\,|q+1$$":[112],".":[113],"both":[115,134],"cases,":[116],"our":[117],"encoding":[118],"methods":[119],"than":[123],"existed":[124],"ones.":[125],"Moreover,":[126],"estimate":[128],"density":[130],"images":[132],"Chebotarev":[137],"theorem.":[138]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2791607020","counts_by_year":[{"year":2018,"cited_by_count":1}],"updated_date":"2024-09-26T14:54:26.982616","created_date":"2018-03-29"}