Results 11 to 20 of about 5,489 (197)

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +2 more sources

Pairing Optimizations for Isogeny-Based Cryptosystems

open access: yesIET Information Security
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj   +2 more sources

Optimal Strategies for Computation of Degree ℓn Isogenies for SIDH [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2020
This article presents methods and algorithms for the computation of isogenies of degree ℓn. Some of these methods are obtained using recurrence equations and generating functions.
Michał Wroński, Andrzej Chojnacki
doaj   +1 more source

An Alternative Approach for SIDH Arithmetic [PDF]

open access: yes, 2021
In this paper, we present new algorithms for the field arithmetic layers of supersingular isogeny Diffie-Hellman; one of the fifteen remaining candidates in the NIST post-quantum standardization process. Our approach uses a polynomial representation of the field elements together with mechanisms to keep the coefficients within bounds during the ...
Cyril Bouvier, Laurent Imbert
openaire   +1 more source

Zones of compounded informality: Migrants in the megacity

open access: yesPoLAR: Political and Legal Anthropology Review, Volume 46, Issue 2, Page 226-240, November 2023., 2023
Abstract This paper introduces the term zones of compounded informality to demarcate locations wherein regulatory exclusions in distinct domains interact to escalate the impact of exclusions for people who live and work in these areas. Based upon a study of India's Delhi, National Capital Region (Delhi‐NCR), I explain how the interaction of flexible ...
Shikha Silliman Bhattacharjee
wiley   +1 more source

Improved Torsion-Point Attacks on SIDH Variants [PDF]

open access: yes, 2021
37 pages including 3 ...
de Quehen, Victoria   +6 more
openaire   +3 more sources

Overview of techniques applicable to self-interference incoherent digital holography [PDF]

open access: yesJournal of the European Optical Society-Rapid Publications, 2013
Self-interference incoherent digital holography (SIDH) retrieves the complex hologram from the object illuminated by the incoherent light. Supported by the adaptive optic feature, SIDH is readily applicable to the ocular imaging to investigate the human ...
Hong J., Kim M. K.
doaj   +1 more source

Penerapan Nilai-nilai Keislaman dan Keindonesiaan di Sekolah Indonesia Den Haag (SIDH) Sebagai Pilar Pendidikan Karakter Islam

open access: yesIntelektual, 2021
This study aims to describe how the application of Islamic and Indonesian values in the Hague Indonesian School (SIDH) as a pillar of Islamic character education.
Khobli Arofad   +3 more
doaj   +1 more source

Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography

open access: yesIET Information Security, Volume 17, Issue 2, Page 171-209, March 2023., 2023
Abstract In this survey, the authors review the main quantum algorithms for solving the computational problems that serve as hardness assumptions for cryptosystem. To this end, the authors consider both the currently most widely used classically secure cryptosystems, and the most promising candidates for post‐quantum secure cryptosystems.
J.‐F. Biasse   +4 more
wiley   +1 more source

A Lightweight, Secure Big Data‐Based Authentication and Key‐Agreement Scheme for IoT with Revocability

open access: yesInternational Journal of Intelligent Systems, Volume 2023, Issue 1, 2023., 2023
With the rapid development of Internet of Things (IoT), designing a secure two‐factor authentication scheme for IoT is becoming increasingly demanding. Two‐factor protocols are deployed to achieve a higher security level than single‐factor protocols.
Behnam Zahednejad   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy