Results 91 to 100 of about 6,385 (201)

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

Analysis of the applicability of existing secret separation schemes in the post-quaternary era

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Modern approaches to secret sharing have been examined, encompassing both classical and post-quantum cryptographic schemes. The study explores methods for distributing secret information among multiple participants using various mathematical primitives ...
E. F. Kustov, S. V. Bezzateev
doaj   +1 more source

dCTIDH: Fast & Deterministic CTIDH

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos   +3 more
doaj   +1 more source

Cohomological dimension of Laumon 1-motives up to isogenies

open access: yes, 2008
We prove that the category of Laumon 1-motives up isogenies over a field of characteristic zero is of cohomological dimension $\le 1$. As a consequence this implies the same result for the category of formal Hodge structures of level $\le 1$ (over ...
Mazzari, N.
core  

Isogenies of abelian varieties

open access: yesJournal of Pure and Applied Algebra, 1993
This paper deals with the following problems: Given two polarized abelian varieties \(X\) and \(Y\) over a field \(F\) which are isogenous over \(\overline F\), are they isogenous over \(F\)? And if they are not, how much of the \(n\)-torsion must be adjoined to \(F\) in order that they are?
Silverberg, A., Zarhin, Yu.G.
openaire   +1 more source

Efficiency of SIDH-based signatures (yes, SIDH)

open access: yesJournal of Mathematical Cryptology
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy