Results 41 to 50 of about 1,022 (119)
Group Signatures and Accountable Ring Signatures from Isogeny-based Assumptions [PDF]
Group signatures are an important cryptographic primitive providing both anonymity and accountability to signatures. Accountable ring signatures combine features from both ring signatures and group signatures, and can be directly transformed to group ...
Chung, Kai-Min +5 more
core +1 more source
A Note on the Security of CSIDH
We propose an algorithm for computing an isogeny between two elliptic curves $E_1,E_2$ defined over a finite field such that there is an imaginary quadratic order $\mathcal{O}$ satisfying $\mathcal{O}\simeq \operatorname{End}(E_i)$ for $i = 1,2$. This concerns ordinary curves and supersingular curves defined over $\mathbb{F}_p$ (the latter used in the ...
Biasse JF, Iezzi A, Jacobson M
openaire +3 more sources
Improved Low-qubit Hidden Shift Algorithms [PDF]
Hidden shift problems are relevant to assess the quantum security of various cryptographic constructs. Multiple quantum subexponential time algorithms have been proposed.
Bonnetain, Xavier
core +1 more source
Multi-Precision Integer (MPI) arithmetic is a performance-critical component of many public-key cryptosystems, including besides classical ones (e.g., RSA, ECC) also isogeny-based post-quantum schemes.
Hao Cheng +5 more
semanticscholar +1 more source
Counting superspecial Richelot isogenies by reduced automorphism groups (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties) [PDF]
The recent cryptanalysis by Costello and Smith [10] employed the subgraphs whose vertices consist of decomposed principally polarized abelian varieties, hence it is important to study the subgraphs in isogeny-based cryptography. Katsura and Takashima [22]
TAKASHIMA, Katsuyuki
core
{KLaPoTi}: An asymptotically efficient isogeny group action from 2-dimensional isogenies [PDF]
We construct and implement an efficient post-quantum commutative cryptographic group action based on combining the SCALLOP framework for group actions from isogenies of oriented elliptic curves on one hand with the recent Clapoti method for polynomial ...
Panny, Lorenz +2 more
core +4 more sources
Secure Messaging Using Post-Quantum Key Sharing Based on CSIDH and Fujisaki-Okamoto Transform
Preserving the confidentiality of information exchanges relies fundamentally on an end-to-end encryption system, involving the use of a secret key to secure the entire communication.
R. Sitraka +3 more
semanticscholar +1 more source
This paper introduces a novel Distributed Key Generation (DKG) protocol based on the Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) framework for secure multi-party cryptography.
M. E. Baraka, Siham Ezzouak
semanticscholar +1 more source
Isogenies and cryptography [PDF]
Cryptography is an essential tool for enabling privacy of electronic communication. However, many of the cryptographic protocols we use nowadays, would be insecure after the development of large-scale quantum computers.
Sotáková, J.
core +2 more sources
This study examines property crime trends in Selangor, Kuala Lumpur, and Putrajaya from 2015 to 2020, utilizing Geographic Information Systems (GIS) and comprehensive crime data from the Royal Malaysia Police.
Azizul Ahmad +8 more
doaj +1 more source

