Results 61 to 70 of about 1,022 (119)

Exploring Spatial Relationship in Criminal Behavior: A Spatial Analysis of Offenders’ Homes and Theft Locations in Kuching, Sarawak, Malaysia

open access: yesForum Geografi
This study aims to identify the proximity of offenders' homes to the theft location in Kuching, Sarawak. The attribute data includes the total number of theft offenders in Kuching in 2018, categorized as solo and co-offenders.
Norita Jubit   +4 more
doaj   +1 more source

Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves [PDF]

open access: yes, 2021
The properties of twisted and quadratic supersingular Edwards curves forming pairs of quadratic torsion with the order p + 1 over the simple field Fp are considered. A modification of the CSIDH algorithm using the isogenies of these curves in replacement
Ageyev, Dmytro   +4 more
core  

Performance and Efficiency Evaluation of M-SIDH

open access: yesIEEE Access
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
doaj   +1 more source

Faster SeaSign signatures through improved rejection sampling [PDF]

open access: yes, 2018
We speed up the isogeny-based "SeaSign'' signature scheme recently proposed by De Feo and Galbraith. The core idea in SeaSign is to apply the "Fiat–Shamir with aborts'' transform to the parallel repeated execution of an identification scheme based on ...
Decru, Thomas   +2 more
core  

On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH [PDF]

open access: yes, 2023
The isogeny-based scheme CSIDH is considered to be the only efficient post-quantum non-interactive key exchange (NIKE) and poses small bandwidth requirements, thus appearing to be an attractive alternative for classical Diffie--Hellman schemes. A crucial
Fabio Campos   +7 more
core  

Spatial Analysis of Flood-Prone Areas in Padang Terap, Kedah: Integrating Spatial Autocorrelation and Optimized Hotspot Analysis

open access: yesForum Geografi
Flooding increasingly threatens socio-economic resilience in Malaysia, particularly in vulnerable districts such as Padang Terap, Kedah. Using a GIS-based framework integrating Spatial Autocorrelation (Moran’s I) and Optimized Hotspot Analysis (Getis-Ord
Azizul Ahmad   +8 more
doaj   +1 more source

Let us walk on the 3-isogeny graph: efficient, fast, and simple

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez   +2 more
doaj   +1 more source

Landslide Susceptibility Mapping of Western Sarawak via Artificial Neural Network

open access: yesJournal of Applied Science & Process Engineering
Landslides are the third most frequent form of natural disaster in Malaysia, following floods and storms. It can cause significant damage to anything in its path, depending on the size and velocity of its debris.
Nur Hisyam Ramli   +8 more
doaj   +1 more source

CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution [PDF]

open access: yes, 2023
For the PQC CSIDH and CSIKE algorithms, the advantages of two classes of quadratic and twisted supersingular Edwards curves over complete Edwards curves are justified.
Abramov, Serhii   +3 more
core  

Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer [PDF]

open access: yes, 2022
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for almost all secure multiparty functionalities. The strongest security notion against malicious adversaries is universal composability (UC-secure).
Cyprien Delpech de Saint Guilhem   +2 more
core  

Home - About - Disclaimer - Privacy