Results 171 to 180 of about 5,489 (197)
Some of the next articles are maybe not open access.

Parallel strategies for SIDH: Towards computing SIDH twice as fast

IEEE Transactions on Computers, 2021
We present novel strategies and concrete algorithms for the parallel computation of the Supersingular Isogeny-based Diffie-Hellman key exchange (SIDH) protocol when executed on multi-core platforms. The most relevant design idea exploited by our approach is that of concurrently computing scalar multiplication operations along with a parallelized ...
Daniel Cervantes-Vazquez   +2 more
openaire   +1 more source

Reconstruction distance formula for Off-axis SIDH

Quantitative Phase Imaging IV, 2018
Even though holography is a powerful technique for three-dimensional (3D) imaging, it could not be applied easily to an incoherent imaging system, for instance fluorescence microscopy. 3D imaging capability in fluorescence microscopy becomes more and more important lately because of great research demand on cell behavior changes in 3D environmental ...
Dugyoung Kim   +3 more
openaire   +1 more source

An adaptive attack on 2-SIDH

International Journal of Computer Mathematics: Computer Systems Theory, 2020
We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-ba...
Samuel Dobson   +4 more
openaire   +1 more source

Efficient Compression of SIDH Public Keys

2017
Supersingular isogeny Diffie-Hellman (SIDH) is an attractive candidate for post-quantum key exchange, in large part due to its relatively small public key sizes. A recent paper by Azarderakhsh, Jao, Kalach, Koziel and Leonardi showed that the public keys defined in Jao and De Feo’s original SIDH scheme can be further compressed by around a factor of ...
Costello, Craig   +5 more
openaire   +3 more sources

Sidh – a Game Based Firefighter Training Simulation

2007 11th International Conference Information Visualization (IV '07), 2007
This paper presents Sidh-a game based firefighter training simulator developed in cooperation between the University ofSkvde and the Swedish Rescue Services Agency. Sidh is based on computer game hardware and software solutions but adds a novel interaction model and gameplay specifically developed for the purpose of training firefighters. The simulator
Per Backlund   +4 more
openaire   +1 more source

Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees

Designs, Codes and Cryptography
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaizhan Lin   +4 more
openaire   +2 more sources

Exploring SIDH-Based Signature Parameters

Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of an elliptic curve.
Basso, Andrea   +6 more
openaire   +2 more sources

การตรวจสอบกุญแจเข้ารหัสสาธารณะบนโปรโตคอลการแลกเปลี่ยนกุญแจแบบ SIDH

ปัจจุบันโปรโตคอลการแลกเปลี่ยนกุญแจสาธารณะเพื่อใช้ในการสร้างความลับร่วมกันที่เรามักนำไปใช้งานในกระบวนการส่งข้อมูลด้วยการเข้ารหัสแบบสมมตรต่ออีกทีนั้นมีหลายแบบ ซึ่งตัวโปรโตคอล SIDH นี้เป็นหนึ่งในโปรโตคอลที่เสนอขึ้นเพื่อใช้ในยุคของ post quantum cryptography เพื่อให้สามารถใช้ได้อย่างปลอดภัยในอนาคตแม้ว่าการสร้าง quantum computer จะสามารถทำได้สำเร็จจริง แต่ต ...
openaire   +1 more source

Analysis of SIDH Alghoritm

2021 IEEE 3rd International Conference on Advanced Trends in Information Theory (ATIT), 2021
Vladyslav Chevardyn H   +3 more
openaire   +1 more source

M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information

2023
Tako Boris Fouotsa   +2 more
openaire   +1 more source

Home - About - Disclaimer - Privacy