Results 91 to 100 of about 1,022 (119)
Effects of multivessel off-pump coronary artery bypass grafting (OPCAB) on diastolic left ventricular (LV) function [PDF]
Bekaert, E +4 more
core +1 more source
Efficiency of RNS in CSIDH:Performance Research In Post-Quantum Cryptography [PDF]
Dorenbos, H.M.R.
core
Mathematical and computational aspects of CSIDH-based algorithms
Maino, L, Pintore, F
openaire +1 more source
Safe-Error Attacks on SIKE and CSIDH [PDF]
The isogeny-based post-quantum schemes SIKE (NIST PQC round 3 alternate candidate) and CSIDH (Asiacrypt 2018) have received only little attention with respect to their fault attack resilience so far.
Fabio Campos +2 more
semanticscholar +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
He Gives C-Sieves on the CSIDH
IACR Cryptology ePrint Archive, 2020Recently, Castryck, Lange, Martindale, Panny, and Renes proposed CSIDH (pronounced “sea-side”) as a candidate post-quantum “commutative group action.” It has attracted much attention and interest, in part because it enables noninteractive Diffie–Hellman ...
Chris Peikert
semanticscholar +2 more sources
CSI-IBBS: Identity-Based Blind Signature using CSIDH
Identity-based cryptography (IBC), proposed by Adi Shamir, revolutionized public key authentication by eliminating the need for certificates, enabling a more efficient and scalable approach to cryptographic systems. Meanwhile, in \cite{Katsumata2024group}
Soumya Bhoumik +3 more
semanticscholar +3 more sources
Practical Robust DKG Protocols for CSIDH
International Conference on Applied Cryptography and Network Security, 2023Shahla Atapoor +3 more
semanticscholar +2 more sources
A Constant-Time Hardware Architecture for the CSIDH Key-Exchange Protocol
The commutative supersingular isogeny Diffie-Hellman (CSIDH) algorithm is a promising post-quantum key exchange protocol, notable for its exceptionally small key sizes, but hindered by computationally intensive key generation.
Sina Bagheri +4 more
semanticscholar +3 more sources
CSIDH: An Efficient Post-Quantum Commutative Group Action [PDF]
We propose an efficient commutative group action suitable for non-interactive key exchange in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev–Stolbunov cryptosystem, but we apply it to supersingular elliptic curves defined over a large prime field Fp, rather than to ordinary elliptic curves.
W. Castryck +4 more
semanticscholar +7 more sources
Low Memory Attacks on Small Key CSIDH
International Conference on Applied Cryptography and Network Security, 2023Jesús-Javier Chi-Domínguez +3 more
semanticscholar +2 more sources

