Results 91 to 100 of about 5,346 (174)

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

Isogenies of abelian varieties

open access: yesJournal of Pure and Applied Algebra, 1993
This paper deals with the following problems: Given two polarized abelian varieties \(X\) and \(Y\) over a field \(F\) which are isogenous over \(\overline F\), are they isogenous over \(F\)? And if they are not, how much of the \(n\)-torsion must be adjoined to \(F\) in order that they are?
Silverberg, A., Zarhin, Yu.G.
openaire   +1 more source

Analysis of the applicability of existing secret separation schemes in the post-quaternary era

open access: yesНаучно-технический вестник информационных технологий, механики и оптики
Modern approaches to secret sharing have been examined, encompassing both classical and post-quantum cryptographic schemes. The study explores methods for distributing secret information among multiple participants using various mathematical primitives ...
E. F. Kustov, S. V. Bezzateev
doaj   +1 more source

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. [PDF]

open access: yesSensors (Basel), 2021
Rani R   +7 more
europepmc   +1 more source

dCTIDH: Fast & Deterministic CTIDH

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos   +3 more
doaj   +1 more source

POKEx: Performance Analysis of POKÉ-Key Exchange and SIDH-Variants

open access: yesIEEE Access
In this paper, we present a comparative performance analysis of the POKÉ-based key exchange and SIDH variants. SIDH gained attention for its small key size and efficient performance, and has been selected as an alternate candidate in NIST PQC ...
Hyeonhak Kim, Suhri Kim
doaj   +1 more source

Supersingular Isogeny Oblivious Transfer

open access: yesAnais do XIX Simpósio Brasileiro de Segurança da Informação e de Sistemas Computacionais (SBSeg 2019), 2019
Neste artigo, apresentamos um protocolo Oblivious Transfer (OT) que combina um esquema OT juntamente com a primitiva do protocolo Supersingular Isogeny Diffie-Hellman (SIDH). Nossa proposta é um candidato para segurança pós-quântica OT e demonstra que o SIDH naturalmente suporta a funcionalidade OT.
Paulo Barreto   +3 more
openaire   +2 more sources

Efficiency of SIDH-based signatures (yes, SIDH)

open access: yesJournal of Mathematical Cryptology
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy