Results 1 to 10 of about 105 (36)
Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves [PDF]
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan +7 more
doaj +3 more sources
Farklı Tip Karayemiş Meyve ve Çekirdeklerinin Besinsel Özellikleri [PDF]
Karayemiş (Prunus laurocerasus) Türkiye’de Karadeniz bölgesinde sıklıkla rastlanan Rosaceae familyasına ait yapraklarını dökmeyen yaklaşık 5-6 metre boylarında küçük beyaz çiçekleri olan bir ağaçtır.
Özlem Emrem Tür, Erman Duman
semanticscholar +3 more sources
— Given a finitely generated field extension K of the rational numbers and an abelian variety C over K, we consider the class of all abelian varieties over K which are isogenous (over K) to an abelian subvariety of a power of C.
Éric Gaudron, Gaël Rémond
semanticscholar +1 more source
On the supersingular GPST attack
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj +1 more source
Isogenies on twisted Hessian curves
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo +3 more
doaj +1 more source
AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES [PDF]
Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP address, name and etc, to compute a public and a private key in a cryptosystem and encrypt a message.
Bahramian, Mojtaba, Hajirezaei, Elham
core +1 more source
Orienting supersingular isogeny graphs
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs.
Colò Leonardo, Kohel David
doaj +1 more source
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David +3 more
doaj +1 more source
The generic isogeny decomposition of the Prym Variety of a cyclic branched covering [PDF]
Let f: S′⟶ S be a cyclic branched covering of smooth projective surfaces over C whose branch locus Δ ⊂ S is a smooth ample divisor. Pick a very ample complete linear system | H| on S, such that the polarized surface (S, | H|) is not a scroll nor has ...
Alexandrou, Theodosis
core +3 more sources
Hash functions from superspecial genus-2 curves using Richelot isogenies
In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2.
Castryck Wouter +2 more
doaj +1 more source

