Traditional approaches to vector similarity search over encrypted data rely on fully homomorphic encryption (FHE) to enable computation without decryption. However, the substantial computational overhead of FHE makes ...
详细信息
This paper proposes a modified version of the Blowfish Algorithm using permutation techniques. These techniques are key parts of the F-function of the algorithm. The first modification is in the bit operations while t...
详细信息
We present efficient algorithms for computing isogenies between hyperelliptic curves, leveraging higher genus curves to enhance cryptographic protocols in the post-quantum context. Our algorithms reduce the computatio...
详细信息
We explore the computational implications of a superposition of spacetimes, a phenomenon hypothesized in quantum gravity theories. This was initiated by Shmueli (2024) where the author introduced the complexity class ...
详细信息
Side-channel vulnerabilities pose an increasing threat to cryptographically protected devices. Consequently, it is crucial to observe information leakages through physical parameters such as power consumption and elec...
详细信息
In this paper, we give efficient algorithms for solving the Diophantine equation f(x, y) = m for arbitrary definite binary quadratic form f, given the factorization of m. While Cornacchia’s algorithm to solve x2 + dy...
详细信息
Cryptographic primitives have been used for various non-cryptographic objectives, such as eliminating or reducing randomness and interaction. We show how to use cryptography to improve the time complexity of solving c...
详细信息
This article analyzes a key exchange protocol based on the triad tropical semiring, recently proposed by Jackson, J. and Perumal, R. We demonstrate that the triad tropical semiring is isomorphic to a circulant matrix ...
详细信息
In this work, we introduce a novel variant of the multivariate quadratic problem, which is at the core of one of the most promising post-quantum alternatives: multivariate cryptography. In this variant, the solution o...
详细信息
In (t, n)-threshold secret sharing, a secret S is distributed among n participants such that any subset of size t can recover S, while any subset of size t − 1 or fewer learns nothing about it. For information-theoret...
详细信息
暂无评论