Results 171 to 180 of about 5,615 (205)
Some of the next articles are maybe not open access.
Designs, Codes, and Cryptography
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaizhan Lin, Shiping Cai, Chang-An Zhao
exaly +3 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaizhan Lin, Shiping Cai, Chang-An Zhao
exaly +3 more sources
International Journal of Computer Mathematics: Computer Systems Theory, 2020
We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-ba...
Samuel Dobson +2 more
exaly +2 more sources
We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-ba...
Samuel Dobson +2 more
exaly +2 more sources
M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information
Lecture Notes in Computer Science, 2023Tako Boris Fouotsa +2 more
exaly +2 more sources
Parallel strategies for SIDH: Towards computing SIDH twice as fast
IEEE Transactions on Computers, 2021We present novel strategies and concrete algorithms for the parallel computation of the Supersingular Isogeny-based Diffie-Hellman key exchange (SIDH) protocol when executed on multi-core platforms. The most relevant design idea exploited by our approach is that of concurrently computing scalar multiplication operations along with a parallelized ...
Daniel Cervantes-Vazquez +2 more
openaire +1 more source
Faster Public-Key Compression of SIDH With Less Memory
IEEE Transactions on Computers, 2023Kaizhan Lin, Lin Jianming, Weize Wang
exaly +2 more sources
Reconstruction distance formula for Off-axis SIDH
Quantitative Phase Imaging IV, 2018Even though holography is a powerful technique for three-dimensional (3D) imaging, it could not be applied easily to an incoherent imaging system, for instance fluorescence microscopy. 3D imaging capability in fluorescence microscopy becomes more and more important lately because of great research demand on cell behavior changes in 3D environmental ...
Dugyoung Kim +3 more
openaire +1 more source
Efficient Compression of SIDH Public Keys
2017Supersingular isogeny Diffie-Hellman (SIDH) is an attractive candidate for post-quantum key exchange, in large part due to its relatively small public key sizes. A recent paper by Azarderakhsh, Jao, Kalach, Koziel and Leonardi showed that the public keys defined in Jao and De Feo’s original SIDH scheme can be further compressed by around a factor of ...
Costello, Craig +5 more
openaire +3 more sources
Sidh – a Game Based Firefighter Training Simulation
2007 11th International Conference Information Visualization (IV '07), 2007This paper presents Sidh-a game based firefighter training simulator developed in cooperation between the University ofSkvde and the Swedish Rescue Services Agency. Sidh is based on computer game hardware and software solutions but adds a novel interaction model and gameplay specifically developed for the purpose of training firefighters. The simulator
Per Backlund +4 more
openaire +1 more source
Exploring SIDH-Based Signature Parameters
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of an elliptic curve.Basso, Andrea +6 more
openaire +2 more sources

