Results 211 to 220 of about 3,965 (252)
Some of the next articles are maybe not open access.
On towers of isogeny graphs with full level structures
Research in the Mathematical Sciences, 2023Let p and ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end ...
Antonio Lei, Katharina Müller
semanticscholar +1 more source
IEEE Transactions on Information Theory, 2023
Group key exchange is a promising cryptographic protocol that has been studied extensively over the years. However, an overwhelming majority of them involve interaction among users.
Surbhi Shaw, Ratna Dutta
semanticscholar +1 more source
Group key exchange is a promising cryptographic protocol that has been studied extensively over the years. However, an overwhelming majority of them involve interaction among users.
Surbhi Shaw, Ratna Dutta
semanticscholar +1 more source
Adding Level Structure to Supersingular Elliptic Curve Isogeny Graphs
Journal de Théorie des Nombres de Bordeaux, 2022In this paper, we add the information of level structure to supersingular elliptic curves and study these objects with the motivation of isogeny-based cryptography.
Sarah Arpin
semanticscholar +1 more source
Unconditional foundations for supersingular isogeny-based cryptography
IACR Cryptology ePrint ArchiveIn this paper, we prove that the supersingular isogeny problem (Isogeny), endomorphism ring problem (EndRing) and maximal order problem (MaxOrder) are equivalent under probabilistic polynomial time reductions, unconditionally.Isogeny-based cryptography ...
Arthur Herlédan Le Merdy +1 more
semanticscholar +1 more source
A Study on Isogeny Based Cryptography
2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC)Quantum cryptography enhances security and addresses vulnerabilities present in traditional cryptography, thereby providing better protection against potential risks posed by quantum computing.
Lakkavaram S M Shriya Varnita +4 more
semanticscholar +1 more source
Efficient Isogeny Proofs Using Generic Techniques
IACR Cryptology ePrint Archive, 2023Kelong Cong, Yi-Fu Lai, Shai Levin
semanticscholar +1 more source
Effective Pairings in Isogeny-based Cryptography
IACR Cryptology ePrint Archive, 2023Krijn Reijnders
semanticscholar +1 more source
1987
We return to p-adic representations. Let A be an elliptic curve defined over K. We take points of A in a fixed algebraic closure Ka. We have the p-adic spaces T p (A) and V p (A) over Z p and Q p respectively.
openaire +1 more source
We return to p-adic representations. Let A be an elliptic curve defined over K. We take points of A in a fixed algebraic closure Ka. We have the p-adic spaces T p (A) and V p (A) over Z p and Q p respectively.
openaire +1 more source
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
Journal of Cryptographic Engineering, 2022Gora Adj +2 more
semanticscholar +1 more source

