Results 181 to 190 of about 2,168 (195)
Some of the next articles are maybe not open access.
SageMath–A Great Environment for Experimenting with Isogeny-based Cryptography
2023openaire +1 more source
Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves
IEEE Transactions on Circuits and Systems I: Regular Papers, 2017Brian Koziel +2 more
exaly
Faster Key Compression for Isogeny-Based Cryptosystems
IEEE Transactions on Computers, 2019Marcos Antonio Simplicio Junior +2 more
exaly
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM
IEEE Transactions on Dependable and Secure Computing, 2019Amir Jalali +2 more
exaly
Postquantum Opportunities: Lattices, Homomorphic Encryption, and Supersingular Isogeny Graphs
IEEE Security and Privacy, 2017exaly
Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera
openalex
Ultra-Fast Modular Multiplication Implementation for Isogeny-Based Post-Quantum Cryptography.
Jing Tian, Jun Lin, Zhongfeng Wang
openalex

