Home

Meandr Myslet si Vpřed extra secrets from automorphisms and sidh based nike oko budu silný autorská práva

Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography
Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography

Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography
Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography

PDF) Orienting supersingular isogeny graphs
PDF) Orienting supersingular isogeny graphs

SIDH Proof of Knowledge | SpringerLink
SIDH Proof of Knowledge | SpringerLink

On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol |  SpringerLink
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol | SpringerLink

On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol -  Africacrypt, July 2020
On Adaptive Attacks against Jao-Urbanik's Isogeny-Based Protocol - Africacrypt, July 2020

Recent videos of IACR talks
Recent videos of IACR talks

Hash functions from superspecial genus-2 curves using Richelot isogenies
Hash functions from superspecial genus-2 curves using Richelot isogenies

PDF) Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication (Full  Version)
PDF) Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication (Full Version)

On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol |  SpringerLink
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol | SpringerLink

Orienting supersingular isogeny graphs
Orienting supersingular isogeny graphs

Orienting supersingular isogeny graphs
Orienting supersingular isogeny graphs

PDF) New Techniques for SIDH-based NIKE
PDF) New Techniques for SIDH-based NIKE

PDF) Orienting supersingular isogeny graphs
PDF) Orienting supersingular isogeny graphs

Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography
Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography

Orienting supersingular isogeny graphs
Orienting supersingular isogeny graphs

Hash functions from superspecial genus-2 curves using Richelot isogenies
Hash functions from superspecial genus-2 curves using Richelot isogenies

New Techniques for SIDH-based NIKE
New Techniques for SIDH-based NIKE

Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies |  SpringerLink
Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies | SpringerLink

Cryptography on Isogeny Graphs
Cryptography on Isogeny Graphs

New PKE Design and Cryptanalysis results in Isogeny-Based Cryptography
New PKE Design and Cryptanalysis results in Isogeny-Based Cryptography

Orienting supersingular isogeny graphs
Orienting supersingular isogeny graphs

Here's How Nike Keeps Its Designs Secret | Sole Collector
Here's How Nike Keeps Its Designs Secret | Sole Collector

On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol |  SpringerLink
On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol | SpringerLink

Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies |  SpringerLink
Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies | SpringerLink

Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography
Elliptic Curves and Public Key Cryptography 3. Isogenies and Cryptography