Results 31 to 40 of about 4,471 (200)
Optimized CSIDH Implementation Using a 2-Torsion Point
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo +4 more
doaj +1 more source
Lines in supersingular quartics
We show that the number of lines contained in a supersingular quartic surface is 40 or at most 32, if the characteristic of the field equals 2, and it is 112, 58, or at most 52, if the characteristic equals 3.
Degtyarev, Alex
core +1 more source
Scalar multiplications are considered an essential aspect of implementations of isogeny‐based cryptography. The efficiency of scalar multiplication depends on the equation of the underlying elliptic curves and the addition chain employed. Bos and Friedberger recently stated that, for larger scalar multiplication, addition‐subtraction chains will become
Sookyung Eom +3 more
wiley +1 more source
On the de Rham and p-adic realizations of the Elliptic Polylogarithm for CM elliptic curves [PDF]
In this paper, we give an explicit description of the de Rham and p-adic polylogarithms for elliptic curves using the Kronecker theta function. We prove in particular that when the elliptic curve has complex multiplication and good reduction at p, then ...
Bannai, Kenichi +2 more
core +2 more sources
A Blockchain‐Assisted Electronic Medical Records by Using Proxy Reencryption and Multisignature
Electronic medical records (EMR) have been commonly used in medical institutions in recent years. In particular, the combination of EMR and the cloud server has significantly improved the work efficiency and therapeutic level of the hospital. It also raises some security concerns, e.g., the information leaks.
Xiaoguang Liu +4 more
wiley +1 more source
Superspecial rank of supersingular abelian varieties and Jacobians [PDF]
An abelian variety defined over an algebraically closed field k of positive characteristic is supersingular if it is isogenous to a product of supersingular elliptic curves and is superspecial if it is isomorphic to a product of supersingular elliptic ...
Achter, Jeff, Pries, Rachel
core +2 more sources
Privacy‐Preserving Task Distribution Mechanism with Cloud‐Edge IoT for the Mobile Crowdsensing
Mobile crowdsensing under big data provides an efficient, win‐win, and low‐budget data collection solution for IoT applications such as the smart city. However, its open and all access scenarios raise the threat of data security and user privacy during task distribution of mobile crowdsensing.
Liquan Jiang, Zhiguang Qin, Jinbo Xiong
wiley +1 more source
Memory Efficient Implementation of Modular Multiplication for 32-bit ARM Cortex-M4
In this paper, we present scalable multi-precision multiplication implementation and scalable multi-precision squaring implementation for 32-bit ARM Cortex-M4 microcontrollers.
Hwajeong Seo
doaj +1 more source
Identifying supersingular elliptic curves [PDF]
AbstractGiven an elliptic curve E over a field of positive characteristic p, we consider how to efficiently determine whether E is ordinary or supersingular. We analyze the complexity of several existing algorithms and then present a new approach that exploits structural differences between ordinary and supersingular isogeny graphs.
openaire +2 more sources
Toward Privacy‐Preserving Blockchain‐Based Electricity Auction for V2G Networks in the Smart Grid
With the development of electric vehicle (EV) technology, EV has become a key component in the future smart grid. Due to the sheer large number of EVs on the road, the emerging vehicle‐to‐grid (V2G) technology, which allows for two‐way electrical flows between EVs and the power grid, is gaining traction.
Weijian Zhang +6 more
wiley +1 more source

