Results 91 to 100 of about 5,346 (174)
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
The isogeny conjecture for A-motives [PDF]
ISSN:1432 ...
openaire +3 more sources
Isogenies of abelian varieties
This paper deals with the following problems: Given two polarized abelian varieties \(X\) and \(Y\) over a field \(F\) which are isogenous over \(\overline F\), are they isogenous over \(F\)? And if they are not, how much of the \(n\)-torsion must be adjoined to \(F\) in order that they are?
Silverberg, A., Zarhin, Yu.G.
openaire +1 more source
Analysis of the applicability of existing secret separation schemes in the post-quaternary era
Modern approaches to secret sharing have been examined, encompassing both classical and post-quantum cryptographic schemes. The study explores methods for distributing secret information among multiple participants using various mathematical primitives ...
E. F. Kustov, S. V. Bezzateev
doaj +1 more source
Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. [PDF]
Rani R +7 more
europepmc +1 more source
Slope classicality in higher Coleman theory via highest weight vectors in completed cohomology. [PDF]
Howe S.
europepmc +1 more source
dCTIDH: Fast & Deterministic CTIDH
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos +3 more
doaj +1 more source
POKEx: Performance Analysis of POKÉ-Key Exchange and SIDH-Variants
In this paper, we present a comparative performance analysis of the POKÉ-based key exchange and SIDH variants. SIDH gained attention for its small key size and efficient performance, and has been selected as an alternate candidate in NIST PQC ...
Hyeonhak Kim, Suhri Kim
doaj +1 more source
Supersingular Isogeny Oblivious Transfer
Neste artigo, apresentamos um protocolo Oblivious Transfer (OT) que combina um esquema OT juntamente com a primitiva do protocolo Supersingular Isogeny Diffie-Hellman (SIDH). Nossa proposta é um candidato para segurança pós-quântica OT e demonstra que o SIDH naturalmente suporta a funcionalidade OT.
Paulo Barreto +3 more
openaire +2 more sources
Efficiency of SIDH-based signatures (yes, SIDH)
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam +2 more
doaj +1 more source

