Results 1 to 10 of about 159 (153)

Verifiable Delay Function and Its Blockchain-Related Application: A Survey [PDF]

open access: yesSensors, 2022
The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random ...
Qiang Wu   +5 more
doaj   +2 more sources

Torsion point attacks on ‘SIDH‐like’ cryptosystems

open access: yesIET Information Security, 2023
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj   +2 more sources

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE [PDF]

open access: yesSensors, 2021
Postquantum cryptography for elevating security against attacks by quantum computers in the Internet of Everything (IoE) is still in its infancy. Most postquantum based cryptosystems have longer keys and signature sizes and require more computations that
Rinki Rani   +7 more
doaj   +2 more sources

Secure IoT in the Era of Quantum Computers—Where Are the Bottlenecks? [PDF]

open access: yesSensors, 2022
Recent progress in quantum computers severely endangers the security of widely used public-key cryptosystems and of all communication that relies on it.
Maximilian Schöffel   +3 more
doaj   +2 more sources

Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves

open access: yesIEEE Access, 2021
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.
Suhri Kim
doaj   +2 more sources

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Supersingular Isogeny-based Cryptography: A Survey

open access: yesInterdisciplinary Information Sciences, 2021
Summary: With the advent of quantum computers that showed the viability of Shor's Algorithm to factor integers, it became apparent that asymmetric cryptographic algorithms might soon become insecure. Since then, a large number of new algorithms that are conjectured to be quantum-secure have been proposed, many of which come with non-negligible trade ...
Stratil, Philipp   +2 more
openaire   +3 more sources

Practical Usage of Radical Isogenies for CSIDH

open access: yesIEEE Access, 2023
Recently, a radical isogeny was proposed to boost commutative supersingular isogeny Diffie–Hellman (CSIDH) implementation. Radical isogenies reduce the generation of a kernel of a small prime order when implementing CSIDH.
Donghoe Heo, Suhri Kim, Seokhie Hong
doaj   +1 more source

Arithmetic Considerations for Isogeny-Based Cryptography [PDF]

open access: yesIEEE Transactions on Computers, 2019
In this paper we investigate various arithmetic techniques which can be used to potentially enhance the performance in the supersingular isogeny Diffie-Hellman (SIDH) key-exchange protocol which is one of the more recent contenders in the post-quantum public-key arena.
Joppe W. Bos, Simon J. Friedberger
openaire   +1 more source

Home - About - Disclaimer - Privacy