Results 151 to 160 of about 2,050 (182)
A Novel Modular Multiplier for Isogeny-Based Post-Quantum Cryptography
Bo Wu +3 more
openalex +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography
Yan Huang +3 more
openalex +1 more source
On the Use of Odd-Degree Isogenies for Implementing SIDH-Based Cryptography
Suhri Kim, Kisoon Yoon, Youngho Park
openalex +1 more source
High-rate measurement-device-independent quantum cryptography
Nature Photonics, 2015Stefano Pirandola +2 more
exaly
A Survey of Microarchitectural Side-channel Vulnerabilities, Attacks, and Defenses in Cryptography
ACM Computing Surveys, 2022exaly
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly

