NIST logo

Publications Portal

You searched on:
Author: Dustin Moody

Displaying records 1 to 10 of 14 records.
Resort by: Date / Title


1. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

2. Elliptic Curves arising from Brahmagupta Quadrilaterals
Published: 8/1/2014
Authors: Farzali Izadi, Foad Khoshnam, Dustin Moody, Arman Zargar
Abstract: A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S. Sastry, by means of elliptic curves. Motivated by ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917344

3. On integer solutions of x^4+y^4-2z^4-2w^4=0
Published: 9/18/2013
Authors: Dustin Moody, Arman Shamsi Zargar
Abstract: In this article, we study the quartic Diophantine equation x^4+y^4-2z^4-2w^4=0. We find non-trivial integer solutions. Furthermore, we show that when a solution has been found, a series of other solutions can be derived. We do so using two dif ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913962

4. Character sums determined by low degree isogenies of elliptic curves
Published: 7/25/2013
Authors: Dustin Moody, Christopher Rasmussen
Abstract: We look at certain character sums determined by isogenies on elliptic curves over finite fields. We prove a congruence condition for character sums attached to arbitrary cyclic isogenies, and produce explicit formulas for isogenies of degree m <= 8.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909562

5. Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier
Published: 12/2/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: A hash function secure in the indi fferentiability framework is able to resist all generic attacks. Such hash functions also play a crucial role in the security of the protocols that use hash functions as random functions. The rate of a hash mode is ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911449

6. Class Numbers via 3-Isogenies and Elliptic Surfaces
Published: 11/6/2012
Authors: Cam McLeman, Dustin Moody
Abstract: We show that a character sum attached to a family of 3-isogenies defi ned on the fibers of a certain elliptic surface over Fp relates to the class number of the quadratic imaginary number field Q(\sqrt{p}). In this sense, this provides a higher-d ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911885

7. Arithmetic Progressions on Huff Curves
Published: 7/23/2012
Author: Dustin Moody
Abstract: We look at arithmetic progressions on elliptic curves known as Huff curves. By an arithmetic progression on an elliptic curve, we mean that either the x or y-coordinates of a sequence of rational points on the curve form an arithmetic progression. ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908329

8. Isomorphism Classes of Edwards Curves over Finite Fields
Published: 5/18/2012
Authors: Reza Farashahi, Dustin Moody, Hongfeng Wu
Abstract: Edwards curves are a new model for elliptic curves, which have attracted notice in cryptography. We give exact formulas for the number of F_q-isomorphism classes of Edwards curves and twisted Edwards curves. This answers a question recently asked ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=908630

9. Improved Indifferentiability Security Bound for the JH Mode
Published: 5/16/2012
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: Indi fferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function is one ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911448

10. Improved Indifferentiability Security Bound for the JH Mode
Published: 3/22/2012
Authors: Dustin Moody, Souradyuti Paul, Daniel C Smith-Tone
Abstract: The JH hash function is one of the five fi nalists of the ongoing NIST SHA3 hash function competition. Despite several earlier attempts, and years of analysis, the indi fferentiability security bound of the JH mode has so far remained remarkably lo ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=910702



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series