作者:
Sterner, Bruno
Institut Polytechnique de Paris Palaiseau France
We give a new approach for finding large smooth twins. Those twins whose sum is a prime are of interest in the parameter setup of certain isogeny-based cryptosystems such as SQIsign. The approach to find such twins is...
详细信息
We study the linear code equivalence problem (LEP) for linear [n, k]-codes over finite fields Fq. Recently, Chou, Persichetti and Santini gave an elegant algorithm that solves LEP over large finite fiel...
详细信息
Kleptography, also known as cryptographic backdoor, poses a significant threat to cryptographic algorithms by clandestinely embedding a backdoor through the use of another cryptographic algorithm, often leveraging pub...
详细信息
With the increasing interest for advanced protocols for Multi-Party Computation, Fully-Homomorphic encryption or Zero-Knowledge proofs, a need for cryptographic algorithms with new constraints has emerged. These algor...
详细信息
Technology advancement is inevitable, and it has created a revolution in all the sectors creating huge opportunities. Artificial intelligence and machine learning have boosted the advancement of all the sectors making...
详细信息
Data security and authentication are critical in cryptography, especially in elliptic curve cryptography (ECC), where usage of efficient finite field multipliers becomes essential. However, these multipliers consume s...
详细信息
Elliptic Curve Point Multiplication (ECPM) is a key component of the Elliptic Curve Cryptography (ECC) hierarchy protocol. However, the specific estimation of resources required for this process remains underexplored ...
详细信息
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. Recently, several isogeny-based cryptosystems using isogenies between Kummer surfaces were proposed. Most of those cryptosystems use (...
详细信息
In recent times the use of small computing devices for gathering information from the real world is increasing day by day. The devices like wireless sensors, RIFD tags, embedded devices and IoT devices are required to...
详细信息
The proposed cipher mechanism entails the encryption of a three - channel coloured input image into a single-channel encrypted image by means of QZS algorithm. Initially R, G and B components are processed parallelly,...
详细信息
暂无评论