Results 71 to 80 of about 159 (153)
Aspects of Elliptic and Hyperelliptic Curve Isogeny-based Cryptography
With the advent of quantum computers in mind, a lot of attention in the field of cryptography has shifted towards new and different mathematical hard problems. One of these shifts is the change from the discrete logarithm problem on a single elliptic curve to isogenies between distinct elliptic curves.
openaire +1 more source
With the development of quantum computing technology, the current cryptographic systems face significant threats. Quantum algorithms, such as Shor’s algorithm, have demonstrated the capability to efficiently solve mathematical problems upon which ...
Anitha Kumari Kumarasamy +3 more
doaj +1 more source
Isogeny-Based Post-Quantum Cryptography
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased cryptography. Because of its certain properties like the hard problem of computing isogenies between two elliptic curves, it makes it to be one of the few candidates for post-quantum cryptography.
openaire +1 more source
Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further improved compression of public keys, leading to the inclusion of public-key compression in the SIKE proposal for Round 2 of the NIST Post-Quantum ...
Naehrig, M., Renes, J.
openaire +2 more sources
Non-Invertible Public Key Certificates. [PDF]
Lizama-Perez LA, López R JM.
europepmc +1 more source
Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography
Summary: Some isogeny-based cryptosystems use addition and doubling on the Jacobian over genus-2 sextic and non-monic hyperelliptic curves. In this study, we generalized some formulae for quintic and monic curves to sextic curves using projective coordinates and then compared them.
Sato, Kaito +2 more
openaire +2 more sources
Resilience Optimization of Post-Quantum Cryptography Key Encapsulation Algorithms. [PDF]
Farooq S +6 more
europepmc +1 more source
We use machine learning to study the moduli space of genus two curves, specifically focusing on detecting whether a genus two curve has $(n, n)$-split Jacobian. Based on such techniques, we observe that there are very few rational moduli points with small weighted moduli height and $(n, n)$-split Jacobian for $n=2, 3, 5$.
Elira Shaska, Tanush Shaska
openaire +3 more sources
Isogenies on twisted Hessian curves. [PDF]
Perez FL, Dang T, Fouotsa E, Moody D.
europepmc +1 more source
Security framework to healthcare robots for secure sharing of healthcare data from cloud. [PDF]
Jain S, Doriya R.
europepmc +1 more source

