Results 111 to 120 of about 10,181 (241)

Isogeny graphs and Isogeny Volcanoes

open access: yes, 2020
\textit{Isogeny graphs} are a type of graphs, where the vertices represent elliptic curves and the edges represent isogenies. I will examine some of the structures of these graphs in this thesis. It turns out that the majority of the components of such a graph will be \textit{volcanoes}, see \cref{defn:pvolcano}.
openaire   +1 more source

Families of elliptic curves with rational 3-torsion

open access: yesJournal of Mathematical Cryptology, 2012
In this paper we look at three families of elliptic curves with rational 3-torsion over a finite field. These families include Hessian curves, twisted Hessian curves, and a new family we call generalized DIK curves. We find the number of -isogeny classes
Moody Dustin, Wu Hongfeng
doaj   +1 more source

Towards Green Computing Oriented Security: A Lightweight Postquantum Signature for IoE. [PDF]

open access: yesSensors (Basel), 2021
Rani R   +7 more
europepmc   +1 more source

Dual Isogenies and Their Application to Public-Key Compression for Isogeny-Based Cryptography

open access: yes, 2019
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further improved compression of public keys, leading to the inclusion of public-key compression in the SIKE proposal for Round 2 of the NIST Post-Quantum ...
Naehrig, M., Renes, J.
openaire   +3 more sources

Formal groups and the isogeny theorem

open access: yesDuke Mathematical Journal, 2001
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
openaire   +3 more sources

On Isogenis of Elliptic curves

open access: yesGlasnik matematički, 2000
The necessary and sufficient conditions for elliptic curves over number field to be isogenous over two different quadratic extensions are done.
openaire   +4 more sources

On the Parallelization of Square-Root Vélu’s Formulas

open access: yesMathematical and Computational Applications
A primary challenge in isogeny-based cryptography lies in the substantial computational cost associated to computing and evaluating prime-degree isogenies.
Jorge Chávez-Saab   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy