[HTML][HTML] Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols

Y Baseri, V Chouhan, A Hafid - Computers & Security, 2024 - Elsevier
The emergence of quantum computing poses a formidable security challenge to network
protocols traditionally safeguarded by classical cryptographic algorithms. This paper …

Recent progress on the elliptic curve discrete logarithm problem

SD Galbraith, P Gaudry - Designs, Codes and Cryptography, 2016 - Springer
Recent progress on the elliptic curve discrete logarithm problem | Designs, Codes and
Cryptography Skip to main content SpringerLink Account Menu Find a journal Publish with us …

SCALLOP: scaling the CSI-FiSh

LD Feo, TB Fouotsa, P Kutas, A Leroux… - … conference on public …, 2023 - Springer
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves
with Prime conductor, a new group action based on isogenies of supersingular curves …

[SÁCH][B] Understanding Bitcoin: Cryptography, engineering and economics

P Franco - 2014 - books.google.com
Discover Bitcoin, the cryptocurrency that has the finance world buzzing Bitcoin is arguably
one of the biggest developments in finance since the advent of fiat currency. With …

SeaSign: compact isogeny signatures from class group actions

L De Feo, SD Galbraith - … in Cryptology–EUROCRYPT 2019: 38th Annual …, 2019 - Springer
We give a new signature scheme for isogenies that combines the class group actions of
CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of …

[SÁCH][B] The arithmetic of elliptic curves

JH Silverman - 2009 - Springer
The theory of elliptic curves is distinguished by its long history and by the diversity of the
methods that have been used in its study. This book treats the arithmetic theory of elliptic …

[SÁCH][B] Introduction to modern cryptography: principles and protocols

J Katz, Y Lindell - 2007 - taylorfrancis.com
Cryptography plays a key role in ensuring the privacy and integrity of data and the security of
computer networks. Introduction to Modern Cryptography provides a rigorous yet accessible …

[SÁCH][B] Guide to elliptic curve cryptography

D Hankerson, AJ Menezes, S Vanstone - 2004 - books.google.com
After two decades of research and development, elliptic curve cryptography now has
widespread exposure and acceptance. Industry, banking, and government standards are in …

[SÁCH][B] Cryptography: theory and practice

DR Stinson - 2005 - api.taylorfrancis.com
THE LEGACYFirst introduced in 1995, Cryptography: Theory and Practice garnered
enormous praise and popularity, and soon became the standard textbook for cryptography …

[SÁCH][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …