-
1
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves
Published 2021-01-01Subjects: Get full text
Article -
2
Arithmetic Using Compression on Elliptic Curves in Huff’s Form and Its Applications
Published 2021-05-01Subjects: Get full text
Article -
3
Efficiency of SIDH-based signatures (yes, SIDH)
Published 2024-03-01Subjects: Get full text
Article -
4
Optimized SeaSign for Enhanced Efficiency
Published 2024-01-01Subjects: “…Isogeny-based cryptography…”
Get full text
Article -
5
Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling
Published 2023-06-01Subjects: “…Isogeny-based cryptography…”
Get full text
Article -
6
Towards Isogeny-Based Password-Authenticated Key Establishment
Published 2020-11-01Subjects: Get full text
Article -
7
-
8
-
9
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
Published 2024-08-01Subjects: Get full text
Article -
10
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
Published 2020-06-01Subjects: “…isogeny-based cryptography…”
Get full text
Article -
11
New Techniques for SIDH-based NIKE
Published 2020-06-01Subjects: “…isogeny-based cryptography…”
Get full text
Article -
12
Paving the Way for SQI<span style="font-variant: small-caps">sign</span>: Toward Efficient Deployment on 32-bit Embedded Devices
Published 2024-10-01Subjects: Get full text
Article -
13
Post-quantum cryptography Algorithm's standardization and performance analysis
Published 2022-09-01Subjects: Get full text
Article