Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Quantum cryptography in 5G networks: A comprehensive overview
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …
VoIP call, instant message or other use of telecommunications systems involves …
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …
An efficient key recovery attack on SIDH
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …
[PDF][PDF] An efficient key recovery attack on SIDH (preliminary version).
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …
An attack on SIDH with arbitrary starting curve
We present an attack on SIDH which does not require any endomorphism information on the
starting curve. Our attack has subexponential complexity thus significantly reducing the …
starting curve. Our attack has subexponential complexity thus significantly reducing the …
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …
Cryptographic group actions and applications
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
cryptography. Recent works have shown how to build efficient (public-key) primitives from …
SQIsign2D-East: A new signature scheme using 2-dimensional isogenies
Isogeny-based cryptography is cryptographic schemes whose security is based on the
hardness of a mathematical problem called the isogeny problem, and is attracting attention …
hardness of a mathematical problem called the isogeny problem, and is attracting attention …
Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …
key encapsulation protocol based on elliptic curves and isogeny maps between them …
Supersingular isogeny graphs and endomorphism rings: reductions and solutions
In this paper, we study several related computational problems for supersingular elliptic
curves, their isogeny graphs, and their endomorphism rings. We prove reductions between …
curves, their isogeny graphs, and their endomorphism rings. We prove reductions between …