Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and its Isogeny-based Applications [PDF]
Bruno Sterner
openalex
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
Engel p-adic Isogeny-based Cryptography over Laurent Series: Foundations, Security, and an ESP32 Implementation [PDF]
Ilias Cherkaoui, Indrakshi Dey
openalex +1 more source
From Holonomy of the Ising Model Form Factors to n-Fold Integrals and the Theory of Elliptic Curves
We recall the form factors $f^(j)_{N,N}$ corresponding to the $lambda$-extension $C(N,N; lambda)$ of the two-point diagonal correlation function of the Ising model on the square lattice and their associated linear differential equations which exhibit ...
Salah Boukraa +3 more
doaj
The supersingular isogeny path and endomorphism ring problems are\n equivalent [PDF]
Benjamin Wesolowski
openalex +1 more source
The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]
Tukur M +6 more
europepmc +1 more source
{KLaPoTi}: An asymptotically efficient isogeny group action from 2-dimensional isogenies
We construct and implement an efficient post-quantum commutative cryptographic group action based on combining the SCALLOP framework for group actions from isogenies of oriented elliptic curves on one hand with the recent Clapoti method for polynomial-time evaluation of the CM group action on elliptic curves on ...
Lorenz Panny +2 more
openaire +1 more source
Isogeny-based Group Signatures and Accountable Ring Signatures in QROM [PDF]
Kai-Min Chung +5 more
openalex +1 more source

