Results 71 to 80 of about 241 (86)
Analysing and exploiting the Mantin biases in RC4. [PDF]
Bricout R +3 more
europepmc +1 more source
Finding shortest lattice vectors faster using quantum search. [PDF]
Laarhoven T, Mosca M, van de Pol J.
europepmc +1 more source
Quantum cryptography beyond quantum key distribution. [PDF]
Broadbent A, Schaffner C.
europepmc +1 more source
Guessing less and better: improved attacks on GIFT-64. [PDF]
Canale F, Naya-Plasencia M.
europepmc +1 more source
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Semiring Actions for Public Key Cryptography
Journal of Computer and Mathematical Sciences, 2019In this paper we give a protocol for public key sharing and encryption and decryption of plaintext using semiring action problem which is a generalization of discrete logarithmic problem. AMS Classification: 16Y60, 11T71, 14G50, 94A60.
S. Nivetha +2 more
semanticscholar +1 more source
Advanced threshold signature schemes leveraging isogeny-based cryptography
Global Journal of Engineering and Technology AdvancesThis paper investigates the use of threshold signature schemes in isogeny-based cryptosystems. By leveraging the distinct features of isogeny graphs, we propose a protocol that offers high security and practical efficiency, making it ideal for ...
Mohammed El Baraka, Siham Ezzouak
semanticscholar +1 more source
Novel Zaslavsky Map Based Pseudorandom Bit Generation Scheme
, 2014B. Stoyanov +2 more
semanticscholar +1 more source

