Results 211 to 220 of about 3,965 (252)
Some of the next articles are maybe not open access.

On towers of isogeny graphs with full level structures

Research in the Mathematical Sciences, 2023
Let p and ℓ\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$$\ell $$\end ...
Antonio Lei, Katharina Müller
semanticscholar   +1 more source

Forward Secure Offline Assisted Group Key Exchange From Isogeny-Based Blinded Key Encapsulation Mechanism

IEEE Transactions on Information Theory, 2023
Group key exchange is a promising cryptographic protocol that has been studied extensively over the years. However, an overwhelming majority of them involve interaction among users.
Surbhi Shaw, Ratna Dutta
semanticscholar   +1 more source

Adding Level Structure to Supersingular Elliptic Curve Isogeny Graphs

Journal de Théorie des Nombres de Bordeaux, 2022
In this paper, we add the information of level structure to supersingular elliptic curves and study these objects with the motivation of isogeny-based cryptography.
Sarah Arpin
semanticscholar   +1 more source

Unconditional foundations for supersingular isogeny-based cryptography

IACR Cryptology ePrint Archive
In this paper, we prove that the supersingular isogeny problem (Isogeny), endomorphism ring problem (EndRing) and maximal order problem (MaxOrder) are equivalent under probabilistic polynomial time reductions, unconditionally.Isogeny-based cryptography ...
Arthur Herlédan Le Merdy   +1 more
semanticscholar   +1 more source

A Study on Isogeny Based Cryptography

2024 International Conference on Electronics, Computing, Communication and Control Technology (ICECCC)
Quantum cryptography enhances security and addresses vulnerabilities present in traditional cryptography, thereby providing better protection against potential risks posed by quantum computing.
Lakkavaram S M Shriya Varnita   +4 more
semanticscholar   +1 more source

An Algorithmic Approach to (2,2)-isogenies in the Theta Model and Applications to Isogeny-based Cryptography

IACR Cryptology ePrint Archive, 2023
Pierrick Dartois   +3 more
semanticscholar   +1 more source

Efficient Isogeny Proofs Using Generic Techniques

IACR Cryptology ePrint Archive, 2023
Kelong Cong, Yi-Fu Lai, Shai Levin
semanticscholar   +1 more source

Effective Pairings in Isogeny-based Cryptography

IACR Cryptology ePrint Archive, 2023
Krijn Reijnders
semanticscholar   +1 more source

The Isogeny Theorems

1987
We return to p-adic representations. Let A be an elliptic curve defined over K. We take points of A in a fixed algebraic closure Ka. We have the p-adic spaces T p (A) and V p (A) over Z p and Q p respectively.
openaire   +1 more source

Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols

Journal of Cryptographic Engineering, 2022
Gora Adj   +2 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy