Results 81 to 90 of about 10,181 (241)

Towards Isogeny-Based Password-Authenticated Key Establishment

open access: yesJournal of Mathematical Cryptology, 2020
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg   +3 more
doaj   +1 more source

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

Towards quantum‐safe blockchain: Exploration of PQC and public‐key recovery on embedded systems

open access: yesIET Blockchain, Volume 5, Issue 1, January/December 2025.
This paper addresses the need for quantum‐safe blockchain solutions specifically for embedded systems by integrating Post‐Quantum Cryptography (PQC) into blockchain frameworks. We propose a quantum‐secure blockchain architecture using NIST‐standardized PQC algorithms, finding Falcon‐512 to be optimal for embedded environments due to its security and ...
Dominik Marchsreiter
wiley   +1 more source

A Comparison of Security and its Performance for Key Agreements in Post-Quantum Cryptography

open access: yesIEEE Access, 2020
Nowadays, we are surrounded by devices collecting and transmitting private information. Currently, the two main mathematical problems that guarantee security on the Internet are the Integer Factorization Problem and the Discrete Logarithm Problem ...
Fabio Borges   +2 more
doaj   +1 more source

On the ranks of elliptic curves with isogenies [PDF]

open access: yesInternational Journal of Number Theory, 2017
In recent years, the question of whether the ranks of elliptic curves defined over [Formula: see text] are unbounded has garnered much attention. One can create refined versions of this question by restricting one’s attention to elliptic curves over [Formula: see text] with a certain algebraic structure, e.g., with a rational point of a given order ...
Harris B. Daniels, Hannah Goodwillie
openaire   +3 more sources

Generic Construction of Dual‐Server Public Key Authenticated Encryption With Keyword Search

open access: yesIET Information Security, Volume 2025, Issue 1, 2025.
In this paper, we propose a generic construction of dual‐server public key authenticated encryption with keyword search (DS‐PAEKS) from PAEKS, public key encryption, and signatures. We also show that previous DS‐PAEKS scheme is vulnerable by providing a concrete attack. That is, the proposed generic construction yields the first DS‐PAEKS schemes.
Keita Emura, Puttamadappa C.
wiley   +1 more source

Heuristics on pairing-friendly elliptic curves

open access: yesJournal of Mathematical Cryptology, 2012
We present a heuristic asymptotic formula as for the number of isogeny classes of pairing-friendly elliptic curves over prime fields with fixed embedding degree , with fixed discriminant, with rho-value bounded by a fixed such that , and with prime ...
Boxall John
doaj   +1 more source

RAPOPORT–ZINK SPACES OF HODGE TYPE

open access: yesForum of Mathematics, Sigma, 2018
When $p>2$ , we construct a Hodge-type analogue of Rapoport–Zink spaces under the unramifiedness assumption, as formal schemes parametrizing ‘deformations’ (up to quasi-isogeny) of $p ...
WANSU KIM
doaj   +1 more source

x2DL: A high throughput architecture for binary‐ring‐learning‐with‐error‐based post quantum cryptography schemes

open access: yesIET Quantum Communication, Volume 5, Issue 4, Page 349-359, December 2024.
An efficient architecture for BRLWE‐based PQC schemes is proposed. It comprises a modified LFSR structure to obtain less latency and high throughput compared to the existing works. Due to reduction in latency, the performance metrics such as delay and area‐delay product (ADP) are also improved.
Shaik Ahmadunnisa, Sudha Ellison Mathe
wiley   +1 more source

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2014
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
De Feo Luca, Jao David, Plût Jérôme
doaj   +1 more source

Home - About - Disclaimer - Privacy