Results 61 to 70 of about 159 (153)
Cryptography based on elliptic curves is endowed with efficient methods for public-key cryptography. Recent research has shown the superiority of the Montgomery and Edwards curves over the Weierstrass curves as they require fewer arithmetic operations ...
Armando Faz Hernandez, Julio López
doaj +1 more source
Unconditional foundations for supersingular isogeny-based cryptography
In this paper, we prove that the supersingular isogeny problem (Isogeny), endomorphism ring problem (EndRing) and maximal order problem (MaxOrder) are equivalent under probabilistic polynomial time reductions, unconditionally.Isogeny-based cryptography is founded on the presumed hardness of these problems, and their interconnection is at the heart of ...
Merdy, Arthur Herlédan Le +1 more
openaire +2 more sources
Let us walk on the 3-isogeny graph: efficient, fast, and simple
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez +2 more
doaj +1 more source
Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications [PDF]
Robert Dryło +2 more
doaj +1 more source
A Programmable Crypto-Processor for National Institute of Standards and Technology Post-Quantum Cryptography Standardization Based on the RISC-V Architecture. [PDF]
Lee J, Kim W, Kim JH.
europepmc +1 more source
Orienteering with One Endomorphism. [PDF]
Arpin S +5 more
europepmc +1 more source
IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph
Post-quantum cryptography (PQC) has been actively explored to meet the requirements arising with the rapid development of quantum computers. The National Institute of Standards and Technology (NIST) conducted a competition to establish the next ...
Jieun Ryu +4 more
doaj +1 more source
Quantum computing threatens widely deployed public-key cryptosystems, accelerating the adoption of Post-Quantum Cryptography (PQC) in practical systems.
Jesus Algar-Fernandez +3 more
doaj +1 more source
The metaverse digital environments: a scoping review of the challenges, privacy and security issues. [PDF]
Tukur M +6 more
europepmc +1 more source
Post-quantum distributed ledger technology: a systematic survey. [PDF]
Parida NK +4 more
europepmc +1 more source

