Results 31 to 40 of about 5,615 (205)

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj   +1 more source

Reconceptualising the Impact of the Inter-American Human Rights System / Reconceitualizando o Impacto do Sistema Interamericano de Direitos Humanos [PDF]

open access: yes, 2017
This article offers a reconceptualization of the impact of the Inter-American Human Rights System (IAHRS, or the System). To understand the impact of the IAHRS, and the continuing demand for it from across the region of Latin America, in particular, we ...
Engstrom, P
core   +1 more source

Bacterial Effector-Involved Temporal and Spatial Regulation by Hijack of the Host Ubiquitin Pathway [PDF]

open access: yes, 2011
Ubiquitination is one of the most conserved post-translational modifications of proteins, and is involved in essential eukaryotic cellular processes.
Tomoko eKubori   +2 more
core   +1 more source

Efficient lattice‐based authenticated key exchange based on key encapsulation mechanism and signature

open access: yesIET Information Security, Volume 15, Issue 1, Page 107-116, January 2021., 2021
Abstract Authenticated key exchange protocol is widely applied in the Internet services. Lattice‐based key exchange protocols turn out to be quantum‐resistant and hence have attracted tremendous attention. A lattice‐based explicit authenticated key exchange protocol is constructed by combining an IND‐CPA key encapsulation mechanism with a strong EUF ...
Guanhao Xue   +3 more
wiley   +1 more source

From paddy fields to sustainable town in four decades: tight integration of urban planning and place management in Yukarigaoka, Japan

open access: yesJournal of Architecture and Urbanism, 2021
Private real estate developers disproportionately focus on spatial planning and short-term returns, often forgetting the crucial role played by place management toward the achievement of sustainable communities.
Marco Capitanio, Sidh Sintusingha
doaj   +1 more source

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

IMPACTOS DA JUSTIÇA TRANSICIONAL SUL-AMERICANA NO SISTEMA INTERAMERICANO DE DIREITOS HUMANOS [PDF]

open access: yesLua Nova: Revista de Cultura e Política, 2018
Resumo O objetivo deste artigo consiste em examinar como o envolvimento gradual do Sistema Interamericano de Direitos Humanos (SIDH) nas questões de justiça transicional sul-americanas contribuiu para moldar parâmetros institucionais e normativos do ...
Isabela Gerbelli Garbin Ramanzini
doaj   +2 more sources

Internalisasi Sikap Toleransi Melalui Pembelajaran PAI di Sekolah Indonesia Den Haag

open access: yesEdification Journal, 2021
This study aims to describe the method of introducing tolerance through Islamic education learning and its stages at the Indonesian School in The Hague. The background of this research stems from the researcher's interest in finding out how educators at ...
Moh Miftakhul Huda   +3 more
doaj   +1 more source

Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals

open access: yes, 2023
IET Information Security, Volume 17, Issue 2, Page 159-160, March 2023.
Ayoub Otmani   +2 more
wiley   +1 more source

Internalization of Moral Values in the Frame of International School

open access: yesAl-Ishlah: Jurnal Pendidikan, 2021
This study aims to see how the process of internalizing moral values in Indonesian Foreign Schools, in this case, the Dutch Indonesian School in The Hague (SIDH). The research method used is descriptive qualitative with data collecting techniques such as
Partono - -   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy