Results 81 to 90 of about 159 (153)

Cyber-physical defense in the quantum Era. [PDF]

open access: yesSci Rep, 2022
Barbeau M, Garcia-Alfaro J.
europepmc   +1 more source

A new approach to delegate signing rights to proxy signers using isogeny-based cryptography

open access: yes
E-governance is a two-way protocol through which one can use government services, share data and request information. It refers to the use of communication and information technologies to provide government services to public in an efficient and fast manner.
Dey, Kunal   +4 more
openaire   +2 more sources

Internet of Things: Security and Solutions Survey. [PDF]

open access: yesSensors (Basel), 2022
Sadhu PK, Yanambaka VP, Abdelgawad A.
europepmc   +1 more source

Supersingular Isogeny-based Cryptography: A Survey

open access: yesSupersingular Isogeny-based Cryptography: A Survey
紀要類(bulletin)
openaire  

An Algorithmic Approach to (2, 2)-Isogenies in the Theta Model and Applications to Isogeny-Based Cryptography

open access: yes
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a precise field operation counting. We present a constant time implementation of our algorithm in Rust and an alternative implementation in ...
Pierrick Dartois   +3 more
openaire   +2 more sources

Engel p-adic Isogeny-based Cryptography over Laurent Series: Foundations, Security, and an ESP32 Implementation

open access: yes
Securing the Internet of Things (IoT) against quantum attacks requires public-key cryptography that (i) remains compact and (ii) runs efficiently on microcontrollers, capabilities many post-quantum (PQ) schemes lack due to large keys and heavy arithmetic.
Cherkaoui, Ilias, Dey, Indrakshi
openaire   +2 more sources

Home - About - Disclaimer - Privacy