Results 101 to 110 of about 2,168 (195)
Cryptography: Mathematical Advancements on Cyber Security [PDF]
The origin of cryptography, the study of encoding and decoding messages, dates back to ancient times around 1900 BC. The ancient Egyptians enlisted the use of basic encryption techniques to conceal personal information.
Bower, Kristin
core +1 more source
Discrete Logarithms in Generalized Jacobians [PDF]
D\'ech\`ene has proposed generalized Jacobians as a source of groups for public-key cryptosystems based on the hardness of the Discrete Logarithm Problem (DLP).
Galbraith, S. D., Smith, B. A.
core +4 more sources
A starting point of this paper is a classification of quadratic polynomial transformations of the monodromy manifold for the 2x2 isomonodromic Fuchsian systems associated to the Painleve VI equation.
Bolibruch +26 more
core +1 more source
Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications [PDF]
Robert Dryło +2 more
doaj +1 more source
Distortion maps for genus two curves [PDF]
Distortion maps are a useful tool for pairing based cryptography. Compared with elliptic curves, the case of hyperelliptic curves of genus g > 1 is more complicated since the full torsion subgroup has rank 2g.
Galbraith, Steven D. +3 more
core +3 more sources
Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and its Isogeny-based Applications [PDF]
Bruno Sterner
openalex
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Improved Low-qubit Hidden Shift Algorithms [PDF]
Hidden shift problems are relevant to assess the quantum security of various cryptographic constructs. Multiple quantum subexponential time algorithms have been proposed.
Bonnetain, Xavier
core +1 more source
IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of Standards and Technology (NIST) conducted a competition to establish the next ...
Jieun Ryu +4 more
doaj +1 more source
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source

