Results 71 to 80 of about 1,022 (119)
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
Authentication, access, and monitoring system for critical areas with the use of artificial intelligence integrated into perimeter security in a data center. [PDF]
Villegas-Ch W, García-Ortiz J.
europepmc +1 more source
Identification of Key Genes during Ethylene-Induced Adventitious Root Development in Cucumber (Cucumis sativus L.). [PDF]
Deng Y, Wang C, Zhang M, Wei L, Liao W.
europepmc +1 more source
Efficient supersingularity testing over F_p and CSIDH key validation
Many public-key cryptographic protocols, notably non-interactive key exchange (NIKE), require incoming public keys to be validated to mitigate some adaptive attacks. In CSIDH, an isogeny-based post-quantum NIKE, a key is deemed legitimate if the given Montgomery coefficient specifies a supersingular elliptic curve over the prime field. In this work, we
Banegas, Gustavo +2 more
openaire +1 more source
The supersingular endomorphism ring problem given one endomorphism
Given a supersingular elliptic curve E and a non-scalar endomorphism $\alpha$ of E, we prove that the endomorphism ring of E can be computed in classical time about disc(Z[$\alpha$])^1/4 , and in quantum subexponential time, assuming the generalised ...
Merdy, Arthur Herlédan Le +1 more
core
Supersingular Endomorphism Rings: Algorithms and Applications [PDF]
This thesis is about the endomorphism rings of supersingular elliptic curves, their applications in cryptography, and related algorithms. These algorithms and applications all involve an interplay between supersingular elliptic curves and quaternion ...
Eriksen, Jonathan Komada
core
Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves [PDF]
In this paper, we present an efficient method to compute arbitrary odd-degree isogenies on Edwards curves. By using the $w$-coordinate, we optimized the isogeny formula on Edwards curves by Moody and Shumow.
Kisoon Yoon +3 more
core
Isogeny Graphs and Cryptographic Applications [PDF]
In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks.
core
Deterministic algorithms for class group actions [PDF]
We present an algorithm for the CSIDH protocol that is fully deterministic and strictly constant time. It does not require dummy operations and can be implemented without conditional branches.
Marc Houben
core

