搜索结果: 1-3 共查到“军队指挥学 Isogeny-based cryptography”相关记录3条 . 查询时间(0.071 秒)
Dual Isogenies and Their Application to Public-key Compression for Isogeny-based Cryptography
Post-quantum cryptography public-key compression supersingular elliptic curves
2019/5/21
The isogeny-based protocols SIDH and SIKE have received much attention for being post-quantum key agreement candidates that retain relatively small keys. A recent line of work has proposed and further...
In this paper we investigate various arithmetic techniques which can be used to potentially enhance the performance in the supersingular isogeny Diffie-Hellman (SIDH) key-exchange protocol which is on...
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Addition chains post-quantum cryptography isogeny-based cryptosystems
2016/12/7
Addition chain calculations play a critical role in determining the efficiency of cryptosystems based on isogenies on elliptic curves. However, finding a minimal length addition chain is not easy; a g...