Results 11 to 20 of about 3,965 (252)

Ghosts and families of abelian varieties with a common isogeny factor

open access: diamondJournal of the European Mathematical Society (Print)
Let S be an integral variety over a finitely generated field k , with generic point \eta , and A\rightarrow S an abelian scheme.
Anna Cadoret, Akio Tamagawa
openalex   +2 more sources

SIKE on GPU: Accelerating Supersingular Isogeny-Based Key Encapsulation Mechanism on Graphic Processing Units

open access: yesIEEE Access, 2021
Since the introduction of the Supersingular isogeny Diffie–Hellman (SIDH) key exchange protocol by Jao and de Feo in 2011, it and its variation (SIKE) have gained significant attention as a promising candidate for post-quantum cryptography (PQC ...
Seog Chung Seo
exaly   +3 more sources

Cuts and isogenies [PDF]

open access: yesJournal of High Energy Physics, 2021
AbstractWe consider the genus-one curves which arise in the cuts of the sunrise and in the elliptic double-box Feynman integrals. We compute and compare invariants of these curves in a number of ways, including Feynman parametrization, lightcone and Baikov (in full and loop-by-loop variants).
Frellesvig, Hjalte   +3 more
openaire   +6 more sources

The Genetic Factors Controlling the Accumulation of Amylase/Trypsin Inhibitors (ATIs) in Barley for Enhancing Human Nutrition and Health. [PDF]

open access: yesFood Sci Nutr
ATIs in cereal seeds link to celiac disease, asthma, and immune response. Here, we report the first study exploring genetic factors affecting ATI levels in barley. GWAS identified multiple QTNs influencing ATI accumulation with notable variation. Eight QTNs are associated with lower ATI levels; a key gene was identified.
Alomari DZ   +8 more
europepmc   +2 more sources

Optimal Strategies for Computation of Degree ℓn Isogenies for SIDH [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
This article presents methods and algorithms for the computation of isogenies of degree ℓn. Some of these methods are obtained using recurrence equations and generating functions.
Michał Wroński, Andrzej Chojnacki
doaj   +1 more source

The supersingular isogeny path and endomorphism ring problems are equivalent [PDF]

open access: yesIEEE Annual Symposium on Foundations of Computer Science, 2021
We prove that the path-finding problem in isogeny graphs and the endomorphism ring problem for supersingular elliptic curves are equivalent under reductions of polynomial expected time, assuming the generalised Riemann hypothesis.
B. Wesolowski
semanticscholar   +1 more source

Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH [PDF]

open access: yesIACR Cryptology ePrint Archive, 2023
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codomain of an isogeny between supersingular curves in characteristic $p$ given only a representation for this isogeny, i.e.
Mingjie Chen   +5 more
semanticscholar   +1 more source

Radical Isogenies [PDF]

open access: yes, 2020
sponsorship: This work was supported in part by the Research Council KU Leuven grants C14/18/067 and STG/17/019, by CyberSecurity Research Flanders with reference number VR20192203, and by the Research Foundation Flanders (FWO) through the WOG Coding Theory and Cryptography. (Research Council KU Leuven|C14/18/067, Research Council KU Leuven|STG/17/019,
Castryck, Wouter   +2 more
openaire   +2 more sources

Practical Usage of Radical Isogenies for CSIDH

open access: yesIEEE Access, 2023
Recently, a radical isogeny was proposed to boost commutative supersingular isogeny Diffie–Hellman (CSIDH) implementation. Radical isogenies reduce the generation of a kernel of a small prime order when implementing CSIDH.
Donghoe Heo, Suhri Kim, Seokhie Hong
doaj   +1 more source

Torsion point attacks on ‘SIDH‐like’ cryptosystems

open access: yesIET Information Security, 2023
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj   +1 more source

Home - About - Disclaimer - Privacy