Results 51 to 60 of about 1,022 (119)

Unveiling urban violence crime in the State of the Selangor, Kuala Lumpur and Putrajaya: a spatial–temporal investigation of violence crime in Malaysia’s key cities

open access: yesCogent Social Sciences
This study investigates the intricate relationship between violent criminal activities, temporal patterns, and land utilization across Selangor State, Kuala Lumpur Federal Territory (KLFT), and Putrajaya Federal Territory (PFT), Malaysia, spanning from ...
Azizul Ahmad   +8 more
doaj   +1 more source

DeCSIDH: Delegating Isogeny Computations in the CSIDH Setting

open access: yes, 2021
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (Grant agreement No. 101020788 -Adv-ERC-ISOCRYPT), the Research Council KU Leuven grant C14/18/067, and by CyberSecurity Research Flanders with reference number VR20192203.
openaire   +2 more sources

Urban Violent Crime Dynamics in Kuala Lumpur and Putrajaya: Utilizing Spatial Temporal Techniques

open access: yesForum Geografi
This paper investigates the patterns of violent crime in Kuala Lumpur and Putrajaya between 2015 and 2020 using advanced spatial analysis techniques, including Spatial Autocorrelation, Standard Deviational Ellipse (SDE), and Mean Centre (MC).
Mohd Sofian Redzuan   +8 more
doaj   +1 more source

A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions

open access: yes, 2023
Blockchain technology provides efficient and secure solutions to various online activities by utilizing a wide range of cryptographic tools. In this article, we survey the existing literature on post-quantum secure digital signatures that possess exotic ...
Buser, M   +12 more
core   +1 more source

On the post-quantum future of Elliptic Curve Cryptography [PDF]

open access: yes, 2023
This thesis is a literature study on current published quantum-resistant isogeny-based key exchange protocols. Here we cover the topic from foundations.
Lucaroni, Rayen
core  

POKEx: Performance Analysis of POKÉ-Key Exchange and SIDH-Variants

open access: yesIEEE Access
In this paper, we present a comparative performance analysis of the POKÉ-based key exchange and SIDH variants. SIDH gained attention for its small key size and efficient performance, and has been selected as an alternate candidate in NIST PQC ...
Hyeonhak Kim, Suhri Kim
doaj   +1 more source

Investigating the Spatial Relation between Landuse and Property Crime in Kuching, Sarawak through Location Quotient Analysis

open access: yesForum Geografi
Urban areas are often associated with higher crime rates, which is a growing concern among communi-ties. This study aim to investigate the spatial relation between landuse and property crime in Kuching, Sarawak through location quotient analysis.
Norita Norita   +3 more
doaj   +1 more source

Optimized SeaSign for Enhanced Efficiency

open access: yesIEEE Access
This paper optimized SeaSign – an isogeny-based digital signature algorithm that combines the class group actions of CSIDH with the notion of Fiat-Shamir with abort.
Suhri Kim
doaj   +1 more source

Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields

open access: yes, 2023
Consider the problem of efficiently evaluating isogenies $\phi: E \to E/H$ of elliptic curves over a finite field $\mathbb{F}_q$, where the kernel $H = \langle G\rangle$ is a cyclic group of odd (prime) order: given $E$, $G$, and a point (or several ...
Banegas, Gustavo   +3 more
core  

Pairing Optimizations for Isogeny-Based Cryptosystems

open access: yesIET Information Security
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj   +1 more source

Home - About - Disclaimer - Privacy