Results 91 to 100 of about 10,181 (241)

Quantum blockchain: Trends, technologies, and future directions

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 516-542, December 2024.
This article surveys the current state of blockchain technology, emphasising its security, authentication protocols, AI integration, and the emerging field of quantum blockchain. It highlights how quantum computing can enhance blockchain security and the necessity for quantum‐resistant designs to ensure the robustness of blockchain networks against ...
Manjula Gandhi S   +15 more
wiley   +1 more source

Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
SQIsign is a well-known post-quantum signature scheme due to its small combined signature and public-key size. However, SQIsign suffers from notably long signing times, and verification times are not short either.
Marius A. Aardal   +8 more
doaj   +1 more source

A survey analysis of quantum computing adoption and the paradigm of privacy engineering

open access: yesSECURITY AND PRIVACY, Volume 7, Issue 6, November/December 2024.
Abstract This study investigates the adoption of quantum computing (QC) technology using the diffusion of innovation (DOI) theory and provides an extensive literature review. We deployed structural equation modeling to analyze data from a survey conducted among 96 top managers in various industries from Canada, the US, and Europe, including IT‐based ...
Nour Mousa, Farid Shirazi
wiley   +1 more source

Optimized SeaSign for Enhanced Efficiency

open access: yesIEEE Access
This paper optimized SeaSign – an isogeny-based digital signature algorithm that combines the class group actions of CSIDH with the notion of Fiat-Shamir with abort.
Suhri Kim
doaj   +1 more source

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action

open access: yesJournal of Mathematical Cryptology, 2020
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David   +3 more
doaj   +1 more source

On extensions of the Jacobson–Morozov theorem to even characteristic

open access: yesJournal of the London Mathematical Society, Volume 110, Issue 5, November 2024.
Abstract Let G$G$ be a simple algebraic group over an algebraically closed field k$\mathbb {k}$ of characteristic 2. We consider analogues of the Jacobson–Morozov theorem in this setting. More precisely, we classify those nilpotent elements with a simple 3‐dimensional Lie overalgebra in g:=Lie(G)$\mathfrak {g}:=\operatorname{Lie}(G)$ and also those ...
David I. Stewart, Adam R. Thomas
wiley   +1 more source

Hard isogeny problems over RSA moduli and groups with infeasible inversion [PDF]

open access: yes, 2019
We initiate the study of computational problems on elliptic curve isogeny graphs defined over RSA moduli. We conjecture that several variants of the neighbor-search problem over these graphs are hard, and provide a comprehensive list of cryptanalytic ...
Altug, Salim Ali, Chen, Yilei
core   +1 more source

Galois invariants of finite abelian descent and Brauer sets

open access: yesBulletin of the London Mathematical Society, Volume 56, Issue 10, Page 3240-3256, October 2024.
Abstract For a variety over a global field, one can consider subsets of the set of adelic points of the variety cut out by finite abelian descent or Brauer–Manin obstructions. Given a Galois extension of the ground field, one can consider similar sets over the extension and take Galois invariants.
Brendan Creutz   +2 more
wiley   +1 more source

Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions

open access: yesIEEE Access
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo   +4 more
doaj   +1 more source

Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism

open access: yesApplied Sciences, 2020
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National ...
Ricardo Villanueva-Polanco   +1 more
doaj   +1 more source

Home - About - Disclaimer - Privacy