Results 11 to 20 of about 5,489 (197)
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez +2 more
doaj +2 more sources
Pairing Optimizations for Isogeny-Based Cryptosystems
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj +2 more sources
Optimal Strategies for Computation of Degree ℓn Isogenies for SIDH [PDF]
This article presents methods and algorithms for the computation of isogenies of degree ℓn. Some of these methods are obtained using recurrence equations and generating functions.
Michał Wroński, Andrzej Chojnacki
doaj +1 more source
An Alternative Approach for SIDH Arithmetic [PDF]
In this paper, we present new algorithms for the field arithmetic layers of supersingular isogeny Diffie-Hellman; one of the fifteen remaining candidates in the NIST post-quantum standardization process. Our approach uses a polynomial representation of the field elements together with mechanisms to keep the coefficients within bounds during the ...
Cyril Bouvier, Laurent Imbert
openaire +1 more source
Zones of compounded informality: Migrants in the megacity
Abstract This paper introduces the term zones of compounded informality to demarcate locations wherein regulatory exclusions in distinct domains interact to escalate the impact of exclusions for people who live and work in these areas. Based upon a study of India's Delhi, National Capital Region (Delhi‐NCR), I explain how the interaction of flexible ...
Shikha Silliman Bhattacharjee
wiley +1 more source
Improved Torsion-Point Attacks on SIDH Variants [PDF]
37 pages including 3 ...
de Quehen, Victoria +6 more
openaire +3 more sources
Overview of techniques applicable to self-interference incoherent digital holography [PDF]
Self-interference incoherent digital holography (SIDH) retrieves the complex hologram from the object illuminated by the incoherent light. Supported by the adaptive optic feature, SIDH is readily applicable to the ocular imaging to investigate the human ...
Hong J., Kim M. K.
doaj +1 more source
This study aims to describe how the application of Islamic and Indonesian values in the Hague Indonesian School (SIDH) as a pillar of Islamic character education.
Khobli Arofad +3 more
doaj +1 more source
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems.
J.‐F. Biasse +4 more
wiley +1 more source
With the rapid development of Internet of Things (IoT), designing a secure two‐factor authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols are deployed to achieve a higher security level than single‐factor protocols.
Behnam Zahednejad +4 more
wiley +1 more source

