Results 51 to 60 of about 2,168 (195)

Ramanujan graphs in cryptography [PDF]

open access: yes, 2018
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria   +4 more
core   +2 more sources

Heuristics on pairing-friendly abelian varieties [PDF]

open access: yes, 2013
We discuss heuristic asymptotic formulae for the number of pairing-friendly abelian varieties over prime fields, generalizing previous work of one of the authors arXiv:math1107.0307Comment: Pages 6-7 rewritten, other minor changes ...
Boxall, John, Gruenewald, David
core   +2 more sources

A Postquantum Linkable Ring Signature Scheme from Coding Theory

open access: yesSecurity and Communication Networks, Volume 2023, Issue 1, 2023., 2023
Linkable ring signatures (LRSs) are ring signatures with the extended property that a verifier can detect whether two messages were signed by the same ring member. LRSs play an important role in many application scenarios such as cryptocurrency and confidential transactions. The first code‐based LRS scheme was put forward in 2018.
Xindong Liu, Li-Ping Wang, Shadab Alam
wiley   +1 more source

A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges   +2 more
doaj   +1 more source

Ring Learning With Errors: A crossroads between postquantum cryptography, machine learning and number theory [PDF]

open access: yes, 2020
The present survey reports on the state of the art of the different cryptographic functionalities built upon the ring learning with errors problem and its interplay with several classical problems in algebraic number theory.
Chacón, Iván Blanco
core   +2 more sources

Isogeny graphs of ordinary abelian varieties [PDF]

open access: yes, 2016
Fix a prime number $\ell$. Graphs of isogenies of degree a power of $\ell$ are well-understood for elliptic curves, but not for higher-dimensional abelian varieties.
Brooks, Ernest Hunter   +2 more
core   +2 more sources

Explicit isogenies in quadratic time in any characteristic [PDF]

open access: yes, 2016
Consider two elliptic curves $E,E'$ defined over the finite field $\mathbb{F}_q$, and suppose that there exists an isogeny $\psi$ between $E$ and $E'$.
De Feo, Luca   +3 more
core   +1 more source

Batching CSIDH Group Actions using AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2021
Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems.
Hao Cheng   +4 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Highly Vectorized SIKE for AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure.
Hao Cheng   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy