LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram [PDF]
In this paper, we propose a novel isogeny-based public key encryption (PKE) scheme named LIT-SiGamal. This is based on a LIT diagram and SiGamal. SiGamal is an isogeny-based PKE scheme that uses a commutative diagram with an auxiliary point.
Tomoki Moriya
core
Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core +3 more sources
Parametrizing Maximal Orders Along Supersingular $\ell$-Isogeny Paths [PDF]
Suppose you have a supersingular $\ell$-isogeny graph with vertices given by $j$-invariants defined over $\mathbb{F}_{p^2}$, where $p = 4 \cdot f \cdot \ell^e - 1$ and $\ell \equiv 3 \pmod{4}$. We give an explicit parametrization of the maximal orders in
Chloe Martindale +2 more
core
Fundamental precision bounds for three-dimensional optical localization microscopy using self-interference digital holography. [PDF]
Marar A, Kner P.
europepmc +1 more source
SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One [PDF]
In this paper, we propose SQIsign2D$^2$, a novel digital signature scheme within the SQIsign2D family. Unlike other SQIsign2D variants, SQIsign2D$^2$ employs the prime $p=CD-1$ as the field characteristic, where $D=2^{e_2}$, $C=3^{e_3}$ and $C\approx D ...
Chang-An Zhao +3 more
core
Implementing the Castryck-Decru attack on SIDH with general primes [PDF]
With the rapid progress of quantum computers in recent years, efforts have been made to standardize new public-key cryptographic protocols which would be secure against them. One of the schemes in contention was Supersingular Isogeny Diffie-Hellman (SIDH)
Laflamme, Jeanne
core
Affecting the Effectors: Regulation of Legionella pneumophila Effector Function by Metaeffectors. [PDF]
Joseph AM, Shames SR.
europepmc +1 more source
How (not) to Build Identity-Based Encryption from Isogenies [PDF]
In this work we show obstacles when constructing identity-based encryption (IBE) from isogenies. We first give a modular description for IBEs, what we call a canonical IBE, that consists of two components: an identity key derivation scheme and a public ...
Elif Ozbay Gurler, Patrick Struck
core
Desenvolvimento de sniffer CAN aplicado ao ônibus elétrico e EposMote III [PDF]
TCC (graduação) - Universidade Federal de Santa Catarina. Campus Joinville. Engenharia Mecatrônica.O trabalho teve como objetivo, desenvolver um sniffer de barramento CAN de um ônibus elétrico utilizando um EposMote III.
Martins, Thiago
core +1 more source
Supersingular Endomorphism Rings: Algorithms and Applications [PDF]
This thesis is about the endomorphism rings of supersingular elliptic curves, their applications in cryptography, and related algorithms. These algorithms and applications all involve an interplay between supersingular elliptic curves and quaternion ...
Eriksen, Jonathan Komada
core

