Results 221 to 230 of about 3,965 (252)
Some of the next articles are maybe not open access.

A survey on isogeny-based cryptographic protocols

Wireless networks
Sweta Mishra, Bhaskar Mondal, R. Jha
semanticscholar   +1 more source

A post-quantum signcryption scheme using isogeny based cryptography

Journal of Information Security and Applications, 2022
Kunal Dey   +3 more
semanticscholar   +1 more source

Computing isogeny on Edwards curves for quantum safe cryptography

International journal of information technology
Ankit Chaudhary   +6 more
semanticscholar   +1 more source

Isogeny problems with level structure

IACR Cryptology ePrint Archive
L. D. Feo, T. Fouotsa, Lorenz Panny
semanticscholar   +1 more source

The average size of the 3‐isogeny Selmer groups of elliptic curves y2=x3+k

Journal of the London Mathematical Society, 2020
Ari Shnidman
exaly  

Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer

Lecture Notes in Computer Science, 2021
Steven D Galbraith
exaly  

Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems

Journal of Applied and Industrial Mathematics
E. Malygina   +7 more
semanticscholar   +1 more source

Faster Key Compression for Isogeny-Based Cryptosystems

IEEE Transactions on Computers, 2019
Geovandro C C F Pereira   +1 more
exaly  

Home - About - Disclaimer - Privacy