Results 81 to 90 of about 8,681 (237)
Digital Signature in Class Group of Isogenies Elliptic Curves
Digital signature protocol based on Schnorr protocol is proposed. Protection against quantum attacks is achieved by using isogenies computation problem.
J. V. Gel, A. G. Rostovtsev
doaj
Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley +1 more source
Hard isogeny problems over RSA moduli and groups with infeasible inversion [PDF]
We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic ...
Altug, Salim Ali, Chen, Yilei
core +1 more source
Supersingular K3 Surfaces are Unirational
We show that supersingular K3 surfaces in characteristic $p\geq5$ are related by purely inseparable isogenies. This implies that they are unirational, which proves conjectures of Artin, Rudakov, Shafarevich, and Shioda.
Liedtke, Christian
core +1 more source
On the ranks of elliptic curves with isogenies [PDF]
In recent years, the question of whether the ranks of elliptic curves defined over [Formula: see text] are unbounded has garnered much attention. One can create refined versions of this question by restricting one’s attention to elliptic curves over [Formula: see text] with a certain algebraic structure, e.g., with a rational point of a given order ...
Harris B. Daniels, Hannah Goodwillie
openaire +3 more sources
Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley +1 more source
The article discusses the peculiarities of the process of information routing in the course of acquisition and processing big data of digital production, including systems of traffic analysis.
Alexandrova Elena +2 more
doaj +1 more source
An effective Arakelov-theoretic version of the hyperbolic isogeny theorem
For an integer $e$ and hyperbolic curve $X$ over $\overline{\mathbb Q}$, Mochizuki showed that there are only finitely many isomorphism classes of hyperbolic curves $Y$ of Euler characteristic $e$ with the same universal cover as $X$.
Javanpeykar, Ariyan
core +1 more source
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley +1 more source
Quantum blockchain: Trends, technologies, and future directions
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S +15 more
wiley +1 more source

