Results 21 to 30 of about 2,050 (182)

A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
With the rapid development of Internet of Things (IoT), designing a secure two‐factor authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols are deployed to achieve a higher security level than single‐factor protocols.
Behnam Zahednejad   +4 more
wiley   +1 more source

Families of fast elliptic curves from Q-curves [PDF]

open access: yes, 2013
We construct new families of elliptic curves over \(\FF_{p^2}\) with efficiently computable endomorphisms, which can be used to accelerate elliptic curve-based cryptosystems in the same way as Gallant-Lambert-Vanstone (GLV) and Galbraith-Lin-Scott (GLS ...
Smith, Benjamin
core   +7 more sources

Memory‐Efficient Algorithm for Scalar Multiplications on Twisted Edwards Curves for Isogeny‐Based Cryptosystems

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
Scalar multiplications are considered an essential aspect of implementations of isogeny‐based cryptography. The efficiency of scalar multiplication depends on the equation of the underlying elliptic curves and the addition chain employed. Bos and Friedberger recently stated that, for larger scalar multiplication, addition‐subtraction chains will become
Sookyung Eom   +3 more
wiley   +1 more source

A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges   +2 more
doaj   +1 more source

Isogeny graphs of ordinary abelian varieties [PDF]

open access: yes, 2016
Fix a prime number $\ell$. Graphs of isogenies of degree a power of $\ell$ are well-understood for elliptic curves, but not for higher-dimensional abelian varieties.
Brooks, Ernest Hunter   +2 more
core   +2 more sources

Batching CSIDH Group Actions using AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems.
Hao Cheng   +4 more
doaj   +1 more source

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals

open access: yes, 2023
IET Information Security, Volume 17, Issue 2, Page 159-160, March 2023.
Ayoub Otmani   +2 more
wiley   +1 more source

Highly Vectorized SIKE for AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure.
Hao Cheng   +3 more
doaj   +1 more source

CTIDH: faster constant-time CSIDH

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
This paper introduces a new key space for CSIDH and a new algorithm for constant-time evaluation of the CSIDH group action. The key space is not useful with previous algorithms, and the algorithm is not useful with previous key spaces, but combining the ...
Gustavo Banegas   +7 more
doaj   +1 more source

Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring [PDF]

open access: yes, 2012
Using Galois cohomology, Schmoyer characterizes cryptographic non-trivial self-pairings of the $\ell$-Tate pairing in terms of the action of the Frobenius on the $\ell$-torsion of the Jacobian of a genus 2 curve.
Belding   +15 more
core   +10 more sources

Home - About - Disclaimer - Privacy