Results 61 to 70 of about 1,022 (119)
This study aims to identify the proximity of offenders' homes to the theft location in Kuching, Sarawak. The attribute data includes the total number of theft offenders in Kuching in 2018, categorized as solo and co-offenders.
Norita Jubit +4 more
doaj +1 more source
Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves [PDF]
The properties of twisted and quadratic supersingular Edwards curves forming pairs of quadratic torsion with the order p + 1 over the simple field Fp are considered. A modification of the CSIDH algorithm using the isogenies of these curves in replacement
Ageyev, Dmytro +4 more
core
Performance and Efficiency Evaluation of M-SIDH
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
doaj +1 more source
Faster SeaSign signatures through improved rejection sampling [PDF]
We speed up the isogeny-based "SeaSign'' signature scheme recently proposed by De Feo and Galbraith. The core idea in SeaSign is to apply the "Fiat–Shamir with aborts'' transform to the parallel repeated execution of an identification scheme based on ...
Decru, Thomas +2 more
core
On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH [PDF]
The isogeny-based scheme CSIDH is considered to be the only efficient post-quantum non-interactive key exchange (NIKE) and poses small bandwidth requirements, thus appearing to be an attractive alternative for classical Diffie--Hellman schemes. A crucial
Fabio Campos +7 more
core
Flooding increasingly threatens socio-economic resilience in Malaysia, particularly in vulnerable districts such as Padang Terap, Kedah. Using a GIS-based framework integrating Spatial Autocorrelation (Moran’s I) and Optimized Hotspot Analysis (Getis-Ord
Azizul Ahmad +8 more
doaj +1 more source
Let us walk on the 3-isogeny graph: efficient, fast, and simple
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez +2 more
doaj +1 more source
Landslide Susceptibility Mapping of Western Sarawak via Artificial Neural Network
Landslides are the third most frequent form of natural disaster in Malaysia, following floods and storms. It can cause significant damage to anything in its path, depending on the size and velocity of its debris.
Nur Hisyam Ramli +8 more
doaj +1 more source
CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution [PDF]
For the PQC CSIDH and CSIKE algorithms, the advantages of two classes of quadratic and twisted supersingular Edwards curves over complete Edwards curves are justified.
Abramov, Serhii +3 more
core
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer [PDF]
Oblivious transfer (OT) is an essential cryptographic tool that can serve as a building block for almost all secure multiparty functionalities. The strongest security notion against malicious adversaries is universal composability (UC-secure).
Cyprien Delpech de Saint Guilhem +2 more
core

