Elligator | Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Elligator: elliptic-curve points indistinguishable from uniform random stringsAuthors Info & ClaimsNovember 2013Pages 967 - 980Published: 04 November 2013 Publication HistoryAbstractCensorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools without completely shutting down the Internet. Tools aim to shape their traffic patterns to match unblocked programs, so ...
Read more at dl.acm.org