Results 11 to 20 of about 274 (176)
The Genetic Factors Controlling the Accumulation of Amylase/Trypsin Inhibitors (ATIs) in Barley for Enhancing Human Nutrition and Health. [PDF]
ATIs in cereal seeds link to celiac disease, asthma, and immune response. Here, we report the first study exploring genetic factors affecting ATI levels in barley. GWAS identified multiple QTNs influencing ATI accumulation with notable variation. Eight QTNs are associated with lower ATI levels; a key gene was identified.
Alomari DZ +8 more
europepmc +2 more sources
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj +1 more source
Review of Chosen Isogeny-Based Cryptographic Schemes
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj +1 more source
Derived isogenies and isogenies for abelian surfaces
In this paper, we study the twisted Fourier-Mukai partners of abelian surfaces. Following the work of Huybrechts [doi:10.4171/CMH/465], we introduce the twisted derived equivalence between abelian surfaces. We show that there is a twisted derived Torelli theorem for abelian surfaces over algebraically closed fields with characteristic $\neq 2,3$.
Li, Zhiyuan, Zou, Haitao
openaire +2 more sources
Algebraic approaches for solving isogeny problems of prime power degrees
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi +5 more
doaj +1 more source
A proof of nondegeneracy of the Tate pairing and Kolyvagin's formula for elliptic curves with good reductions over an $n$-dimensional $(n\leq 3)$ pseudolocal field, the Tate pairing associated to an isogeny between abelian varieties over pseudolocal ...
V.I. Nesteruk
doaj +3 more sources
Modular isogeny complexes [PDF]
Minor revisions for ...
openaire +3 more sources
Optimized CSIDH Implementation Using a 2-Torsion Point
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo +4 more
doaj +1 more source
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper recounts the theory behind these graphs and examines several recently developed algorithms that ...
openaire +2 more sources
Proposal of a New Isogeny-Based Cryptographic Protocol: Formal Analysis and Comparison [PDF]
This paper proposes a novel isogeny-based cryptographic protocol that leverages the dual hardness of the isogeny problem and linear code decoding for secure post-quantum key exchange.
mohammed EL BARAKA, Siham Ezzouak
doaj +1 more source

