Results 121 to 130 of about 6,385 (201)

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

From Holonomy of the Ising Model Form Factors to n-Fold Integrals and the Theory of Elliptic Curves

open access: yesSymmetry, Integrability and Geometry: Methods and Applications, 2007
We recall the form factors $f^(j)_{N,N}$ corresponding to the $lambda$-extension $C(N,N; lambda)$ of the two-point diagonal correlation function of the Ising model on the square lattice and their associated linear differential equations which exhibit ...
Salah Boukraa   +3 more
doaj  

The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]

open access: yesFront Big Data, 2023
Tukur M   +6 more
europepmc   +1 more source

{KLaPoTi}: An asymptotically efficient isogeny group action from 2-dimensional isogenies

open access: yesIACR Communications in Cryptology
We construct and implement an efficient post-quantum commutative cryptographic group action based on combining the SCALLOP framework for group actions from isogenies of oriented elliptic curves on one hand with the recent Clapoti method for polynomial-time evaluation of the CM group action on elliptic curves on ...
Lorenz Panny   +2 more
openaire   +1 more source

Isogeny-based Group Signatures and Accountable Ring Signatures in QROM [PDF]

open access: green, 2021
Kai-Min Chung   +5 more
openalex   +1 more source

Home - About - Disclaimer - Privacy