Results 221 to 230 of about 3,965 (252)
Some of the next articles are maybe not open access.
A survey on isogeny-based cryptographic protocols
Wireless networksSweta Mishra, Bhaskar Mondal, R. Jha
semanticscholar +1 more source
A post-quantum signcryption scheme using isogeny based cryptography
Journal of Information Security and Applications, 2022Kunal Dey +3 more
semanticscholar +1 more source
Computing isogeny on Edwards curves for quantum safe cryptography
International journal of information technologyAnkit Chaudhary +6 more
semanticscholar +1 more source
Isogeny problems with level structure
IACR Cryptology ePrint ArchiveL. D. Feo, T. Fouotsa, Lorenz Panny
semanticscholar +1 more source
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
IACR Cryptology ePrint ArchiveHiroshi Onuki, Kohei Nakagawa
semanticscholar +1 more source
LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram
IACR Cryptology ePrint ArchiveTomoki Moriya
semanticscholar +1 more source
The average size of the 3‐isogeny Selmer groups of elliptic curves y2=x3+k
Journal of the London Mathematical Society, 2020Ari Shnidman
exaly
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer
Lecture Notes in Computer Science, 2021Steven D Galbraith
exaly
Faster Key Compression for Isogeny-Based Cryptosystems
IEEE Transactions on Computers, 2019Geovandro C C F Pereira +1 more
exaly

