Results 1 to 10 of about 105 (36)

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves [PDF]

open access: yesJournal of Mathematical Cryptology, 2020
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan   +7 more
doaj   +3 more sources

Farklı Tip Karayemiş Meyve ve Çekirdeklerinin Besinsel Özellikleri [PDF]

open access: yesKocatepe Veterinary Journal
Karayemiş (Prunus laurocerasus) Türkiye’de Karadeniz bölgesinde sıklıkla rastlanan Rosaceae familyasına ait yapraklarını dökmeyen yaklaşık 5-6 metre boylarında küçük beyaz çiçekleri olan bir ağaçtır.
Özlem Emrem Tür, Erman Duman
semanticscholar   +3 more sources

Nouveaux théorèmes d’isogénie

open access: yesMémoires de la Société mathématique de France, 2023
— Given a finitely generated field extension K of the rational numbers and an abelian variety C over K, we consider the class of all abelian varieties over K which are isogenous (over K) to an abelian subvariety of a power of C.
Éric Gaudron, Gaël Rémond
semanticscholar   +1 more source

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

Isogenies on twisted Hessian curves

open access: yesJournal of Mathematical Cryptology, 2021
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo   +3 more
doaj   +1 more source

AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES [PDF]

open access: yes, 2021
Identity-Based Encryption is a public key cryptosystem that uses the receiver identifier information such as email address, IP address, name and etc, to compute a public and a private key in a cryptosystem and encrypt a message.
Bahramian, Mojtaba, Hajirezaei, Elham
core   +1 more source

Orienting supersingular isogeny graphs

open access: yesJournal of Mathematical Cryptology, 2020
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs.
Colò Leonardo, Kohel David
doaj   +1 more source

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action

open access: yesJournal of Mathematical Cryptology, 2020
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David   +3 more
doaj   +1 more source

The generic isogeny decomposition of the Prym Variety of a cyclic branched covering [PDF]

open access: yes, 2021
Let f: S′⟶ S be a cyclic branched covering of smooth projective surfaces over C whose branch locus Δ ⊂ S is a smooth ample divisor. Pick a very ample complete linear system | H| on S, such that the polarized surface (S, | H|) is not a scroll nor has ...
Alexandrou, Theodosis
core   +3 more sources

Hash functions from superspecial genus-2 curves using Richelot isogenies

open access: yesJournal of Mathematical Cryptology, 2020
In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2.
Castryck Wouter   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy