Results 71 to 80 of about 274 (176)
Parabolic subgroups in characteristics 2 and 3
Abstract This text brings to an end the classification of non‐reduced parabolic subgroups in positive characteristic, especially 2 and 3: they are all obtained as intersections of parabolics having maximal reduced part. We prove this result and deduce a few geometric consequences on rational projective homogeneous varieties.
Matilde Maccan
wiley +1 more source
Optimized SeaSign for Enhanced Efficiency
This paper optimized SeaSign – an isogeny-based digital signature algorithm that combines the class group actions of CSIDH with the notion of Fiat-Shamir with abort.
Suhri Kim
doaj +1 more source
Strong subgroup recurrence and the Nevo–Stuck–Zimmer theorem
Abstract Let Γ$\Gamma$ be a countable group and Sub(Γ)$\mathrm{Sub}(\Gamma)$ its Chabauty space, namely, the compact Γ$\Gamma$‐space consisting of all subgroups of Γ$\Gamma$. We call a subgroup Δ∈Sub(Γ)$\Delta \in \mathrm{Sub}(\Gamma)$ a boomerang subgroup if for every γ∈Γ$\gamma \in \Gamma$, γniΔγ−ni→Δ$\gamma ^{n_i} \Delta \gamma ^{-n_i} \rightarrow ...
Yair Glasner, Waltraud Lederle
wiley +1 more source
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
We present a quantum algorithm which computes group action inverses of the complex multiplication group action on isogenous ordinary elliptic curves, using subexponential time, but only polynomial quantum space.
Jao David +3 more
doaj +1 more source
Arithmetic Satake compactifications and algebraic Drinfeld modular forms
Abstract In this article, we construct the arithmetic Satake compactification of the Drinfeld moduli schemes of arbitrary rank over the ring of integers of any global function field away from the level structure, and show that the universal family extends uniquely to a generalized Drinfeld module over the compactification.
Urs Hartl, Chia‐Fu Yu
wiley +1 more source
POKEx: Performance Analysis of POKÉ-Key Exchange and SIDH-Variants
In this paper, we present a comparative performance analysis of the POKÉ-based key exchange and SIDH variants. SIDH gained attention for its small key size and efficient performance, and has been selected as an alternate candidate in NIST PQC ...
Hyeonhak Kim, Suhri Kim
doaj +1 more source
Abstract S. Gukov and C. Vafa proposed a characterization of rational N=(1,1)$N=(1,1)$ superconformal field theories (SCFTs) in 1+1$1+1$ dimensions with Ricci‐flat Kähler target spaces in terms of the Hodge structure of the target space, extending an earlier observation by G. Moore.
Abhiram Kidambi +2 more
wiley +1 more source
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
This paper analyzes the security and performance of the isogeny-based hash functions. The isogeny-based hash function was first proposed by Charles, Goren, and Lauter, and is referred to as the CGL hash function.
Donghoe Heo +4 more
doaj +1 more source
Cold Boot Attacks on the Supersingular Isogeny Key Encapsulation (SIKE) Mechanism
This research paper evaluates the feasibility of cold boot attacks on the Supersingular Isogeny Key Encapsulation (SIKE) mechanism. This key encapsulation mechanism has been included in the list of alternate candidates of the third round of the National ...
Ricardo Villanueva-Polanco +1 more
doaj +1 more source
Isogeny graphs and Isogeny Volcanoes
\textit{Isogeny graphs} are a type of graphs, where the vertices represent elliptic curves and the edges represent isogenies. I will examine some of the structures of these graphs in this thesis. It turns out that the majority of the components of such a graph will be \textit{volcanoes}, see \cref{defn:pvolcano}.
openaire +1 more source

