Results 151 to 160 of about 2,168 (195)

Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography

open access: closedLecture Notes in Computer Science, 2018
Isogeny based cryptographic systems are one of the very competitive systems that are potentially secure against quantum attacks. The run time of isogeny based systems are dominated by a sequence of point multiplications and isogeny computations performed over supersingular elliptic curves in a specific order. The order of the sequence play an important
Aaron Hutchinson, Koray Karabina
exaly   +4 more sources

Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography

Information Processing Letters, 2022
In the paper under review, the authors propose a method that can serve as a useful technique for faster implementation of isogeny-based cryptography. Actually, some explicit formulas for evaluating an \(l\)-isogenous curve from three differential points on different curve models are presented: 1.
Huang, Yan   +3 more
openaire   +4 more sources

Isogeny-Based Cryptography: A Promising Post-Quantum Technique

IT Professional, 2019
Recent advances in quantum computing have made existing public key cryptosystems vulnerable to enormous security threats. Therefore, numerous efforts have been exploring post-quantum cryptographic techniques to address the emergence of quantum computing. We focus on one promising post-quantum cryptography known as “isogeny-based cryptography,” first by
Cong Peng   +3 more
openaire   +3 more sources

Home - About - Disclaimer - Privacy