Results 61 to 69 of about 696 (69)
On the leakage-resilient key exchange
Typically, secure channels are constructed from an authenticated key exchange (AKE) protocol, which authenticates the communicating parties based on long-term public keys and establishes secret session keys.
Alawatugoda Janaka
doaj +1 more source
DAGS: Key encapsulation using dyadic GS codes
Code-based cryptography is one of the main areas of interest for NIST’s Post-Quantum Cryptography Standardization call. In this paper, we introduce DAGS, a Key Encapsulation Mechanism (KEM) based on quasi-dyadic generalized Srivastava codes.
Banegas Gustavo +12 more
doaj +1 more source
On the non-idealness of cyclotomic families of pairing-friendly elliptic curves
Let k=2mpn$k=2^mp^n$ for an odd prime p and integers m ≥ 0 and n ≥ 0. We obtain lower bounds for the ρ-values of cyclotomic families of pairing-friendly elliptic curves with embedding degree k and r(x)=Φk(x)$r(x)=\Phi _k(x)$.
Sha Min
doaj +1 more source
The condition number associated with ideal lattices from odd prime degree cyclic number fields
The condition number of a generator matrix of an ideal lattice derived from the ring of integers of an algebraic number field is an important quantity associated with the equivalence between two computational problems in lattice-based cryptography, the ...
de Araujo Robson Ricardo
doaj +1 more source
Smaller public keys for MinRank-based schemes
MinRank is an NP-complete problem in linear algebra whose characteristics make it attractive to build post-quantum cryptographic primitives. Several MinRank-based digital signature schemes have been proposed.
Di Scala Antonio J., Sanna Carlo
doaj +1 more source
A note on cohomology and algebraic geometric codes on the curves over rings
Let A be a local Artinian ring with residue field k(A). Let X be a curve over A and let be X′ = X ×spec A spec k(A) the fiber of X over k(A). Consider ℒ an invertible sheaf on X and ℒ ′ = ϕ*ℒ ∈ Pic(X′), where ϕ : X′ → X is the natural map.
Nyamda Francis, Mouaha Christophe
doaj +1 more source
On the normality of <i>p</i>-ary bent functions. [PDF]
Meidl W, Pirsic Í.
europepmc +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
Giovani, disuguaglianze, potere. Introduzione
Alessandro Simonicca
doaj +1 more source

