Results 171 to 180 of about 5,615 (205)
Some of the next articles are maybe not open access.

Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees

Designs, Codes, and Cryptography
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Kaizhan Lin, Shiping Cai, Chang-An Zhao
exaly   +3 more sources

An adaptive attack on 2-SIDH

International Journal of Computer Mathematics: Computer Systems Theory, 2020
We present a polynomial-time adaptive attack on the 2-SIDH protocol. The 2-SIDH protocol is a special instance of the countermeasure proposed by Azarderakhsh, Jao and Leonardi to perform isogeny-ba...
Samuel Dobson   +2 more
exaly   +2 more sources

M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information

Lecture Notes in Computer Science, 2023
Tako Boris Fouotsa   +2 more
exaly   +2 more sources

Secret Keys in Genus-2 SIDH

Lecture Notes in Computer Science, 2022
Sabrina Kunzweiler
exaly   +2 more sources

Parallel strategies for SIDH: Towards computing SIDH twice as fast

IEEE Transactions on Computers, 2021
We present novel strategies and concrete algorithms for the parallel computation of the Supersingular Isogeny-based Diffie-Hellman key exchange (SIDH) protocol when executed on multi-core platforms. The most relevant design idea exploited by our approach is that of concurrently computing scalar multiplication operations along with a parallelized ...
Daniel Cervantes-Vazquez   +2 more
openaire   +1 more source

Faster Public-Key Compression of SIDH With Less Memory

IEEE Transactions on Computers, 2023
Kaizhan Lin, Lin Jianming, Weize Wang
exaly   +2 more sources

Reconstruction distance formula for Off-axis SIDH

Quantitative Phase Imaging IV, 2018
Even though holography is a powerful technique for three-dimensional (3D) imaging, it could not be applied easily to an incoherent imaging system, for instance fluorescence microscopy. 3D imaging capability in fluorescence microscopy becomes more and more important lately because of great research demand on cell behavior changes in 3D environmental ...
Dugyoung Kim   +3 more
openaire   +1 more source

Efficient Compression of SIDH Public Keys

2017
Supersingular isogeny Diffie-Hellman (SIDH) is an attractive candidate for post-quantum key exchange, in large part due to its relatively small public key sizes. A recent paper by Azarderakhsh, Jao, Kalach, Koziel and Leonardi showed that the public keys defined in Jao and De Feo’s original SIDH scheme can be further compressed by around a factor of ...
Costello, Craig   +5 more
openaire   +3 more sources

Sidh – a Game Based Firefighter Training Simulation

2007 11th International Conference Information Visualization (IV '07), 2007
This paper presents Sidh-a game based firefighter training simulator developed in cooperation between the University ofSkvde and the Swedish Rescue Services Agency. Sidh is based on computer game hardware and software solutions but adds a novel interaction model and gameplay specifically developed for the purpose of training firefighters. The simulator
Per Backlund   +4 more
openaire   +1 more source

Exploring SIDH-Based Signature Parameters

Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves E and E′. This problem is closely related to that of computing the endomorphism ring of an elliptic curve.
Basso, Andrea   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy