Results 11 to 20 of about 47 (34)

Integer factoring and compositeness witnesses

open access: yesJournal of Mathematical Cryptology, 2020
We describe a reduction of the problem of factorization of integers n ≤ x in polynomial-time (log x)M+O(1) to computing Euler’s totient function, with exceptions of at most xO(1/M) composite integers that cannot be factored at all, and at most x exp −cM ...
Pomykała Jacek, Radziejewski Maciej
doaj   +1 more source

SPEEDING UP MULTI- EXPONENTIATION ALGORITHM ON A MULTICORE SYSTEM

open access: yes, 2018
A public key cryptosystem is a basic tool to protect data security. Most public key cryptosystem schemes include time consuming operations such as the modular multi exponentiation.
Khaled A. Fathy   +2 more
semanticscholar   +1 more source

Time-memory trade-offs for index calculus in genus 3

open access: yesJournal of Mathematical Cryptology, 2015
In this paper, we present a variant of Diem's O˜(q)${\widetilde{O}(q)}$ index calculus algorithm to attack the discrete logarithm problem (DLP) in Jacobians of genus 3 non-hyperelliptic curves over a finite field 𝔽q.
Laine Kim, Lauter Kristin
doaj   +1 more source

COMPUTING IMAGES OF GALOIS REPRESENTATIONS ATTACHED TO ELLIPTIC CURVES

open access: yesForum of Mathematics, Sigma, 2016
Let $E$ be an elliptic curve without complex multiplication (CM) over a number field $K$
ANDREW V. SUTHERLAND
doaj   +1 more source

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2014
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
De Feo Luca, Jao David, Plût Jérôme
doaj   +1 more source

New lattice attacks on DSA schemes

open access: yesJournal of Mathematical Cryptology, 2016
We prove that a system of linear congruences of a particular form has at most a unique solution below a certain bound which can be computed efficiently.
Poulakis Dimitrios
doaj   +1 more source

Establishment of clinical criteria for the diagnosis of adverse food reactions in dogs with atopic dermatitis

open access: yesVeterinary Dermatology, Volume 35, Issue 4, Page 418-431, August 2024.
Background – Diagnosis of canine adverse food reactions (AFRs) is based on vague criteria, such as ‘>50% improvement’ during elimination diet trial (EDT) followed by ‘deterioration’ during provocation test (PT). Objective – The objective of the study was to use predefined criteria to evaluate response during EDT [i.e., Owner Global Assessment of ...
Evi I. Sofou   +4 more
wiley   +1 more source

Longitudinal evaluation of the cutaneous and rectal microbiota of German shepherd dogs with perianal fistulas undergoing therapy with ciclosporin and ketoconazole

open access: yesVeterinary Dermatology, Volume 35, Issue 4, Page 375-385, August 2024.
Background – Perianal fistulas are painful ulcers or sinus tracts that disproportionately affect German shepherd dogs and are proposed as a spontaneous animal model of fistulising Crohn's disease. Objectives – To characterise the rectal and cutaneous microbiota in German shepherd dogs with perianal fistulas and to investigate longitudinal shifts with ...
Christine L. Cain   +6 more
wiley   +1 more source

On addition-subtraction chains of numbers with low Hamming weight. [PDF]

open access: yesNotes Number Theory Discret Math, 2019
Moody D, Tall A.
europepmc   +1 more source

The anti-inflammatory effect of hydrogen sulphide on acute necrotizing pancreatitis in rats. [PDF]

open access: yesTurk J Surg, 2017
Sağlam K   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy