Results 61 to 70 of about 159 (153)

High-Performance Elliptic Curve Cryptography: A SIMD Approach to Modern Curves (Extended Thesis Summary)

open access: yesCLEI Electronic Journal
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj   +1 more source

Unconditional foundations for supersingular isogeny-based cryptography

open access: yes
In this paper, we prove that the supersingular isogeny problem (Isogeny), endomorphism ring problem (EndRing) and maximal order problem (MaxOrder) are equivalent under probabilistic polynomial time reductions, unconditionally.Isogeny-based cryptography is founded on the presumed hardness of these problems, and their interconnection is at the heart of ...
Merdy, Arthur Herlédan Le   +1 more
openaire   +2 more sources

Let us walk on the 3-isogeny graph: efficient, fast, and simple

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez   +2 more
doaj   +1 more source

Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2021
Robert Dryło   +2 more
doaj   +1 more source

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph

open access: yesIEEE Access
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of Standards and Technology (NIST) conducted a competition to establish the next ...
Jieun Ryu   +4 more
doaj   +1 more source

Benchmarking Post-Quantum Signatures and KEMs on General-Purpose CPUs Using a TCP Client–Server Testbed

open access: yesComputers
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez   +3 more
doaj   +1 more source

The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]

open access: yesFront Big Data, 2023
Tukur M   +6 more
europepmc   +1 more source

Post-quantum distributed ledger technology: a systematic survey. [PDF]

open access: yesSci Rep, 2023
Parida NK   +4 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy