Results 31 to 40 of about 159 (153)
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant attention as a promising candidate for post-quantum cryptography (PQC ...
Seog Chung Seo
doaj +1 more source
The Role of Non-Positional Arithmetic on Efficient Emerging Cryptographic Algorithms
Number representation systems establish ways in which numbers are mapped to computer architectures, and how operations over the numbers are translated into computer instructions.
Paulo Martins, Leonel Sousa
doaj +1 more source
Optimization of isogeny computation algorithms for post-quantum cryptography
Isogeny-based cryptography has emerged as a strong candidate for post-quantum security due to the believed hardness of finding isogenies between supersingular elliptic curves.
Mohammed El Baraka, Siham Ezzouak
doaj +1 more source
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David +3 more
doaj +1 more source
Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography [PDF]
Isogeny based post-quantum cryptography is one of the most recent addition to the family of quantum resistant cryptosystems. In this paper we propose an efficient modular multiplication algorithm for primes of the form \(p=2\cdot {2^a}3^b-1\) with b even, typically used in such cryptosystem.
Karmakar, Angshuman +3 more
openaire +1 more source
ATIs in cereal seeds link to celiac disease, asthma, and immune response. Here, we report the first study exploring genetic factors affecting ATI levels in barley. GWAS identified multiple QTNs influencing ATI accumulation with notable variation. Eight QTNs are associated with lower ATI levels; a key gene was identified.
Dalia Z. Alomari +8 more
wiley +1 more source
Quantum‐Resistant Security in Digital Twin Healthcare Systems
Quantum‐safe architecture for secure healthcare data transmission integrating QKD, edge devices, and cloud‐based Digital Twin analytics. ABSTRACT The development of digital twin (DT) systems for healthcare presents several challenges, particularly in ensuring data protection and communication security in real‐time environments.
Ahmed K. Jameil, Hamed Al‐Raweshidy
wiley +1 more source
On fixed‐point‐free involutions in actions of finite exceptional groups of Lie type
Abstract Let G$G$ be a nontrivial transitive permutation group on a finite set Ω$\Omega$. By a classical theorem of Jordan, G$G$ contains a derangement, which is an element with no fixed points on Ω$\Omega$. Given a prime divisor r$r$ of |Ω|$|\Omega |$, we say that G$G$ is r$r$‐elusive if it does not contain a derangement of order r$r$. In a paper from
Timothy C. Burness, Mikko Korhonen
wiley +1 more source
dCTIDH: Fast & Deterministic CTIDH
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos +3 more
doaj +1 more source

