Results 51 to 58 of about 68 (58)
The condition number associated with ideal lattices from odd prime degree cyclic number fields
The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the ...
de Araujo Robson Ricardo
doaj +1 more source
On the leakage-resilient key exchange
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys.
Alawatugoda Janaka
doaj +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
On the normality of <i>p</i>-ary bent functions. [PDF]
Meidl W, Pirsic Í.
europepmc +1 more source
On Gray Images of Cyclic and Self-Orthogonal Codes over Fq+uFq+vFq. [PDF]
Saif SH, Alhomaidhi AA.
europepmc +1 more source
On tiny-probability lattice enumeration. [PDF]
Aono Y, Nguyen PQ.
europepmc +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
Giovani, disuguaglianze, potere. Introduzione
Alessandro Simonicca
doaj +1 more source

