Results 31 to 40 of about 4,471 (200)

Optimized CSIDH Implementation Using a 2-Torsion Point

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +1 more source

Lines in supersingular quartics

open access: yes, 2021
We show that the number of lines contained in a supersingular quartic surface is 40 or at most 32, if the characteristic of the field equals 2, and it is 112, 58, or at most 52, if the characteristic equals 3.
Degtyarev, Alex
core   +1 more source

Memory‐Efficient Algorithm for Scalar Multiplications on Twisted Edwards Curves for Isogeny‐Based Cryptosystems

open access: yesMathematical Problems in Engineering, Volume 2022, Issue 1, 2022., 2022
Scalar multiplications are considered an essential aspect of implementations of isogeny‐based cryptography. The efficiency of scalar multiplication depends on the equation of the underlying elliptic curves and the addition chain employed. Bos and Friedberger recently stated that, for larger scalar multiplication, addition‐subtraction chains will become
Sookyung Eom   +3 more
wiley   +1 more source

On the de Rham and p-adic realizations of the Elliptic Polylogarithm for CM elliptic curves [PDF]

open access: yes, 2008
In this paper, we give an explicit description of the de Rham and p-adic polylogarithms for elliptic curves using the Kronecker theta function. We prove in particular that when the elliptic curve has complex multiplication and good reduction at p, then ...
Bannai, Kenichi   +2 more
core   +2 more sources

A Blockchain‐Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Electronic medical records (EMR) have been commonly used in medical institutions in recent years. In particular, the combination of EMR and the cloud server has significantly improved the work efficiency and therapeutic level of the hospital. It also raises some security concerns, e.g., the information leaks.
Xiaoguang Liu   +4 more
wiley   +1 more source

Superspecial rank of supersingular abelian varieties and Jacobians [PDF]

open access: yes, 2015
An abelian variety defined over an algebraically closed field k of positive characteristic is supersingular if it is isogenous to a product of supersingular elliptic curves and is superspecial if it is isomorphic to a product of supersingular elliptic ...
Achter, Jeff, Pries, Rachel
core   +2 more sources

Privacy‐Preserving Task Distribution Mechanism with Cloud‐Edge IoT for the Mobile Crowdsensing

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
Mobile crowdsensing under big data provides an efficient, win‐win, and low‐budget data collection solution for IoT applications such as the smart city. However, its open and all access scenarios raise the threat of data security and user privacy during task distribution of mobile crowdsensing.
Liquan Jiang, Zhiguang Qin, Jinbo Xiong
wiley   +1 more source

Memory Efficient Implementation of Modular Multiplication for 32-bit ARM Cortex-M4

open access: yesApplied Sciences, 2020
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers.
Hwajeong Seo
doaj   +1 more source

Identifying supersingular elliptic curves [PDF]

open access: yesLMS Journal of Computation and Mathematics, 2012
AbstractGiven an elliptic curve E over a field of positive characteristic p, we consider how to efficiently determine whether E is ordinary or supersingular. We analyze the complexity of several existing algorithms and then present a new approach that exploits structural differences between ordinary and supersingular isogeny graphs.
openaire   +2 more sources

Toward Privacy‐Preserving Blockchain‐Based Electricity Auction for V2G Networks in the Smart Grid

open access: yesSecurity and Communication Networks, Volume 2022, Issue 1, 2022., 2022
With the development of electric vehicle (EV) technology, EV has become a key component in the future smart grid. Due to the sheer large number of EVs on the road, the emerging vehicle‐to‐grid (V2G) technology, which allows for two‐way electrical flows between EVs and the power grid, is gaining traction.
Weijian Zhang   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy