Results 41 to 50 of about 312 (116)

LIT-SiGamal: An efficient isogeny-based PKE based on a LIT diagram [PDF]

open access: yes
In this paper, we propose a novel isogeny-based public key encryption (PKE) scheme named LIT-SiGamal. This is based on a LIT diagram and SiGamal. SiGamal is an isogeny-based PKE scheme that uses a commutative diagram with an auxiliary point.
Tomoki Moriya
core  

Towards Side-Channel Infrastructure for Software Implementations of PQC Algorithms [PDF]

open access: yes
Post-Quantum Cryptography (PQC) is a new class of asymmetric cryptography algorithms that are supposed to be secure against both classical computers and quantum computers through Shor’s algorithm.
Teague, Tristen
core   +3 more sources

Parametrizing Maximal Orders Along Supersingular $\ell$-Isogeny Paths [PDF]

open access: yes
Suppose you have a supersingular $\ell$-isogeny graph with vertices given by $j$-invariants defined over $\mathbb{F}_{p^2}$, where $p = 4 \cdot f \cdot \ell^e - 1$ and $\ell \equiv 3 \pmod{4}$. We give an explicit parametrization of the maximal orders in
Chloe Martindale   +2 more
core  

SQIsign2D$^2$: New SQIsign2D Variant by Leveraging Power Smooth Isogenies in Dimension One [PDF]

open access: yes
In this paper, we propose SQIsign2D$^2$, a novel digital signature scheme within the SQIsign2D family. Unlike other SQIsign2D variants, SQIsign2D$^2$ employs the prime $p=CD-1$ as the field characteristic, where $D=2^{e_2}$, $C=3^{e_3}$ and $C\approx D ...
Chang-An Zhao   +3 more
core  

Implementing the Castryck-Decru attack on SIDH with general primes [PDF]

open access: yes
With the rapid progress of quantum computers in recent years, efforts have been made to standardize new public-key cryptographic protocols which would be secure against them. One of the schemes in contention was Supersingular Isogeny Diffie-Hellman (SIDH)
Laflamme, Jeanne
core  

How (not) to Build Identity-Based Encryption from Isogenies [PDF]

open access: yes
In this work we show obstacles when constructing identity-based encryption (IBE) from isogenies. We first give a modular description for IBEs, what we call a canonical IBE, that consists of two components: an identity key derivation scheme and a public ...
Elif Ozbay Gurler, Patrick Struck
core  

Desenvolvimento de sniffer CAN aplicado ao ônibus elétrico e EposMote III [PDF]

open access: yes, 2017
TCC (graduação) - Universidade Federal de Santa Catarina. Campus Joinville. Engenharia Mecatrônica.O trabalho teve como objetivo, desenvolver um sniffer de barramento CAN de um ônibus elétrico utilizando um EposMote III.
Martins, Thiago
core   +1 more source

Supersingular Endomorphism Rings: Algorithms and Applications [PDF]

open access: yes
This thesis is about the endomorphism rings of supersingular elliptic curves, their applications in cryptography, and related algorithms. These algorithms and applications all involve an interplay between supersingular elliptic curves and quaternion ...
Eriksen, Jonathan Komada
core  

Home - About - Disclaimer - Privacy