Results 111 to 119 of about 1,022 (119)
Some of the next articles are maybe not open access.

Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith

IACR Cryptology ePrint Archive, 2023
Jonas Meers, Julian Nowakowski
semanticscholar   +1 more source

L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space

Discrete Applied Mathematics, 2023
Kohei Nakagawa   +3 more
semanticscholar   +1 more source

Secure Messaging Application Development: Based on Post-Quantum Algorithms CSIDH, Falcon, and AES Symmetric Key Cryptosystem

Programming and computer software
Nhu-Quynh Luc   +4 more
semanticscholar   +1 more source

Fault Injection Attacks on RSA and CSIDH

Fault injection attacks are attacks where the attackers intentionally induce the fault in the device during the operation to obtain or recover secret information. The induced fault will impact the operation and cause the faulty output, providing the information to attackers. Many cryptographic algorithms and devices have been proven vulnerable to fault
openaire   +1 more source

Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors

IACR Cryptology ePrint Archive, 2020
A. Hutchinson   +3 more
semanticscholar   +1 more source

Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512

IACR Cryptology ePrint Archive, 2020
A. Kaafarani   +2 more
semanticscholar   +1 more source

On Lions and Elligators: An efficient constant-time implementation of CSIDH

IACR Cryptology ePrint Archive, 2019
Michael Meyer, Fabio Campos, S. Reith
semanticscholar   +1 more source

Efficient and Secure CSIDH Using Relation Lattices

Mohamed Bourefis   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy