Results 91 to 100 of about 2,050 (182)

Distortion maps for genus two curves [PDF]

open access: yes, 2005
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D.   +3 more
core   +3 more sources

IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph

open access: yesIEEE Access
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of Standards and Technology (NIST) conducted a competition to establish the next ...
Jieun Ryu   +4 more
doaj   +1 more source

The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]

open access: yesFront Big Data, 2023
Tukur M   +6 more
europepmc   +1 more source

Ranking of post-quantum cryptography digital signature schemes using evaluation based on distance from average solutions

open access: yesMajlesi Journal of Electrical Engineering
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy   +3 more
doaj   +1 more source

Post-quantum distributed ledger technology: a systematic survey. [PDF]

open access: yesSci Rep, 2023
Parida NK   +4 more
europepmc   +1 more source

Proxy Blind Signature using Hyperelliptic Curve Cryptography [PDF]

open access: yes, 2013
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins and should also be mimicked electronically. A user has to fulll above two properties of blind signature for permission to
Pradhan, Srikanta
core  

Non-Invertible Public Key Certificates. [PDF]

open access: yesEntropy (Basel), 2021
Lizama-Perez LA, López R JM.
europepmc   +1 more source

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

Isogenies on twisted Hessian curves. [PDF]

open access: yesJ Math Cryptol, 2021
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc   +1 more source

Home - About - Disclaimer - Privacy