Results 101 to 110 of about 312 (116)
Some of the next articles are maybe not open access.

Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees

Designs, Codes, and Cryptography
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaizhan Lin, Shiping Cai, Chang-An Zhao
exaly   +3 more sources

Faster Public-Key Compression of SIDH With Less Memory

IEEE Transactions on Computers, 2023
Kaizhan Lin, Lin Jianming, Weize Wang
exaly  

Secret Keys in Genus-2 SIDH

Lecture Notes in Computer Science, 2022
Sabrina Kunzweiler
exaly  

High Performance Modular Multiplication for SIDH

IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
Weiqiang Liu, Ziying Ni
exaly  

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

IET Information Security, 2021
Daniel Cervantes-Vázquez   +2 more
exaly  

A Direct Key Recovery Attack on SIDH

Lecture Notes in Computer Science, 2023
Benjamin Wesolowski
exaly  

New Techniques for SIDH-based NIKE

Journal of Mathematical Cryptology, 2020
David Urbanik, David Jao
exaly  

SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH

Lecture Notes in Computer Science, 2021
Tako Boris Fouotsa, Christophe Petit
exaly  

A New Adaptive Attack on SIDH

Lecture Notes in Computer Science, 2022
exaly  

A Polynomial-Time Attack on G2SIDH

Lecture Notes in Computer Science, 2023
exaly  

Home - About - Disclaimer - Privacy