Results 81 to 90 of about 8,681 (237)

Digital Signature in Class Group of Isogenies Elliptic Curves

open access: yesБезопасность информационных технологий, 2010
Digital signature protocol based on Schnorr protocol is proposed. Protection against quantum attacks is achieved by using isogenies computation problem.
J. V. Gel, A. G. Rostovtsev
doaj  

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

Hard isogeny problems over RSA moduli and groups with infeasible inversion [PDF]

open access: yes, 2019
We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic ...
Altug, Salim Ali, Chen, Yilei
core   +1 more source

Supersingular K3 Surfaces are Unirational

open access: yes, 2014
We show that supersingular K3 surfaces in characteristic $p\geq5$ are related by purely inseparable isogenies. This implies that they are unirational, which proves conjectures of Artin, Rudakov, Shafarevich, and Shioda.
Liedtke, Christian
core   +1 more source

On the ranks of elliptic curves with isogenies [PDF]

open access: yesInternational Journal of Number Theory, 2017
In recent years, the question of whether the ranks of elliptic curves defined over [Formula: see text] are unbounded has garnered much attention. One can create refined versions of this question by restricting one’s attention to elliptic curves over [Formula: see text] with a certain algebraic structure, e.g., with a rational point of a given order ...
Harris B. Daniels, Hannah Goodwillie
openaire   +3 more sources

Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley   +1 more source

Application of hierarchic authentication to isogenies of elliptic curves for providing safety of data routing in the systems of analysis of digital production traffica

open access: yesSHS Web of Conferences, 2018
The article discusses the peculiarities of the process of information routing in the course of acquisition and processing big data of digital production, including systems of traffic analysis.
Alexandrova Elena   +2 more
doaj   +1 more source

An effective Arakelov-theoretic version of the hyperbolic isogeny theorem

open access: yes, 2015
For an integer $e$ and hyperbolic curve $X$ over $\overline{\mathbb Q}$, Mochizuki showed that there are only finitely many isomorphism classes of hyperbolic curves $Y$ of Euler characteristic $e$ with the same universal cover as $X$.
Javanpeykar, Ariyan
core   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Home - About - Disclaimer - Privacy