Results 71 to 80 of about 159 (153)

Aspects of Elliptic and Hyperelliptic Curve Isogeny-based Cryptography

open access: yes, 2022
With the advent of quantum computers in mind, a lot of attention in the field of cryptography has shifted towards new and different mathematical hard problems. One of these shifts is the change from the discrete logarithm problem on a single elliptic curve to isogenies between distinct elliptic curves.
openaire   +1 more source

Ranking of post-quantum cryptography digital signature schemes using evaluation based on distance from average solutions

open access: yesMajlesi Journal of Electrical Engineering
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy   +3 more
doaj   +1 more source

Isogeny-Based Post-Quantum Cryptography

open access: yes, 2019
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased cryptography. Because of its certain properties like the hard problem of computing isogenies between two elliptic curves, it makes it to be one of the few candidates for post-quantum cryptography.
openaire   +1 more source

Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography

open access: yes, 2019
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further improved compression of public keys, leading to the inclusion of public-key compression in the SIKE proposal for Round 2 of the NIST Post-Quantum ...
Naehrig, M., Renes, J.
openaire   +2 more sources

Non-Invertible Public Key Certificates. [PDF]

open access: yesEntropy (Basel), 2021
Lizama-Perez LA, López R JM.
europepmc   +1 more source

Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography

open access: yesJSIAM Letters
Summary: Some isogeny-based cryptosystems use addition and doubling on the Jacobian over genus-2 sextic and non-monic hyperelliptic curves. In this study, we generalized some formulae for quintic and monic curves to sextic curves using projective coordinates and then compared them.
Sato, Kaito   +2 more
openaire   +2 more sources

Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]

open access: yesSensors (Basel), 2023
Farooq S   +6 more
europepmc   +1 more source

Machine learning for moduli space of genus two curves and an application to isogeny-based cryptography

open access: yesJournal of Algebraic Combinatorics
We use machine learning to study the moduli space of genus two curves, specifically focusing on detecting whether a genus two curve has $(n, n)$-split Jacobian. Based on such techniques, we observe that there are very few rational moduli points with small weighted moduli height and $(n, n)$-split Jacobian for $n=2, 3, 5$.
Elira Shaska, Tanush Shaska
openaire   +3 more sources

Isogenies on twisted Hessian curves. [PDF]

open access: yesJ Math Cryptol, 2021
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc   +1 more source

Home - About - Disclaimer - Privacy