Results 151 to 160 of about 2,168 (195)
Efficient representation of isogenies and application in Isogeny-Based Cryptography [PDF]
PINNOLA, LUCA
openalex
Constructing Canonical Strategies for Parallel Implementation of Isogeny Based Cryptography
Isogeny based cryptographic systems are one of the very competitive systems that are potentially secure against quantum attacks. The run time of isogeny based systems are dominated by a sequence of point multiplications and isogeny computations performed over supersingular elliptic curves in a specific order. The order of the sequence play an important
Aaron Hutchinson, Koray Karabina
exaly +4 more sources
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Optimizing the evaluation of ℓ-isogenous curve for isogeny-based cryptography
Information Processing Letters, 2022In the paper under review, the authors propose a method that can serve as a useful technique for faster implementation of isogeny-based cryptography. Actually, some explicit formulas for evaluating an \(l\)-isogenous curve from three differential points on different curve models are presented: 1.
Huang, Yan +3 more
openaire +4 more sources
Isogeny-Based Cryptography: A Promising Post-Quantum Technique
IT Professional, 2019Recent advances in quantum computing have made existing public key cryptosystems vulnerable to enormous security threats. Therefore, numerous efforts have been exploring post-quantum cryptographic techniques to address the emergence of quantum computing. We focus on one promising post-quantum cryptography known as “isogeny-based cryptography,” first by
Cong Peng +3 more
openaire +3 more sources

