Results 91 to 100 of about 2,050 (182)
Distortion maps for genus two curves [PDF]
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D. +3 more
core +3 more sources
IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of Standards and Technology (NIST) conducted a competition to establish the next ...
Jieun Ryu +4 more
doaj +1 more source
The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]
Tukur M +6 more
europepmc +1 more source
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy +3 more
doaj +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source
Proxy Blind Signature using Hyperelliptic Curve Cryptography [PDF]
Blind signature is the concept to ensure anonymity of e-coins. Untracebility and unlinkability are two main properties of real coins and should also be mimicked electronically. A user has to fulll above two properties of blind signature for permission to
Pradhan, Srikanta
core
Non-Invertible Public Key Certificates. [PDF]
Lizama-Perez LA, López R JM.
europepmc +1 more source
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
Isogenies on twisted Hessian curves. [PDF]
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc +1 more source
Engel p-adic Isogeny-based Cryptography over Laurent Series: Foundations, Security, and an ESP32 Implementation [PDF]
Ilias Cherkaoui, Indrakshi Dey
openalex +1 more source

