Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Computing -isogenies between Kummer lines
D Robert, N Sarkis - IACR Communications in Cryptology, 2024 - hal.science
We use theta groups to study $2 $-isogenies between Kummer lines, with a particular focus
on the Montgomery model. This allows us to recover known formula, along with more …
on the Montgomery model. This allows us to recover known formula, along with more …
Fast 4 way vectorized ladder for the complete set of montgomery curves
This paper introduces 4 way vectorization of Montgomery ladder on any Montgomery form
elliptic curve. Our algorithm takes 2M^ 4+ 1S^ 4 (M^ 4: A vector of four field multiplications …
elliptic curve. Our algorithm takes 2M^ 4+ 1S^ 4 (M^ 4: A vector of four field multiplications …
The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography
Recently, some studies have constructed one-coordinate arithmetics on elliptic curves. For
example, formulas of the $ x $-coordinate of Montgomery curves, $ x $-coordinate of …
example, formulas of the $ x $-coordinate of Montgomery curves, $ x $-coordinate of …
An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT
Digital signatures are a vital part of the digital world. The trust factor in the digital world is
ensured with a digital signature. Over the evolution, the purpose remained constant, but the …
ensured with a digital signature. Over the evolution, the purpose remained constant, but the …
Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications
R Anusha, R Saravanan - Soft Computing, 2025 - Springer
Digital signatures, essential for establishing trust in the digital realm, have evolved in their
application and importance alongside emerging technologies such as the Internet of Things …
application and importance alongside emerging technologies such as the Internet of Things …
Isogeny computation on Kummer lines and applications
C Chen, F Zhang, C Zhao - Journal of Information Security and Applications, 2023 - Elsevier
Isogeny-based cryptography has been the hotspot in recent years owing to its resistance to
quantum computing attacks. Unfortunately, efficiency is the main bottleneck that limits its …
quantum computing attacks. Unfortunately, efficiency is the main bottleneck that limits its …
Simplified isogeny formulas on twisted Jacobi quartic curves
Z Hu, Z Liu, L Wang, Z Zhou - Finite Fields and Their Applications, 2022 - Elsevier
Isogenies between elliptic curves play a very important role in elliptic curve related
cryptosystems and cryptanalysis. It is widely known that different models of elliptic curves …
cryptosystems and cryptanalysis. It is widely known that different models of elliptic curves …
On the Efficient Representation of Isogenies: A Survey for NuTMiC 2024
D Robert - … Conference on Number-Theoretic Methods in …, 2024 - Springer
On the Efficient Representation of Isogenies | SpringerLink Skip to main content Advertisement
Springer Nature Link Account Menu Find a journal Publish with us Track your research …
Springer Nature Link Account Menu Find a journal Publish with us Track your research …
Kummer for genus one over prime order fields
This work considers the problem of fast and secure scalar multiplication using curves of
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz in 2009 …
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz in 2009 …
Kummer for genus one over prime-order fields
This work considers the problem of fast and secure scalar multiplication using curves of
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz (Finite …
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz (Finite …