专题:Cryptography and Residue Arithmetic

This cluster of papers explores the applications, algorithms, and implementations of elliptic curve cryptography, with a focus on pairing-based cryptosystems, efficient algorithms for finite fields, quantum-resistant cryptosystems, and protection against side-channel attacks. It also covers hardware implementations and the use of elliptic curves in public key encryption.
最新文献
Differentially Private Secure Multiplication with Erasures and Adversaries

article Full Text OpenAlex

SQIsignHD: New Dimensions in Cryptography

book-chapter Full Text OpenAlex

A Randomised Lattice Rule Algorithm with Pre-determined Generating Vector and Random Number of Points for Korobov Spaces with $$0 < \alpha \le 1/2$$

book-chapter Full Text OpenAlex

A Pairing Free Provable Public Key Dual Receiver Encryption Scheme

article Full Text OpenAlex

A High Speed and Area Efficient Processor for Elliptic Curve Scalar Point Multiplication for GF(2 m )

article Full Text OpenAlex

Elliptic Curve Cryptosystems

book-chapter Full Text OpenAlex

FPGA Based Accelerator for Implementation of Large Integer Polynomials

article Full Text OpenAlex

Hierarchical signature scheme based on elliptic curve digital signature algorithm

article Full Text OpenAlex

RSA Implementation Using FPGA

article Full Text OpenAlex

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves

preprint Full Text OpenAlex

近5年高被引文献
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process

report Full Text OpenAlex 335 FWCI0

F1: A Fast and Programmable Accelerator for Fully Homomorphic Encryption

article Full Text OpenAlex 222 FWCI22.01215772

An Efficient Key Recovery Attack on SIDH

book-chapter Full Text OpenAlex 216 FWCI188.89890162

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

article Full Text OpenAlex 151 FWCI56.61867547

Elliptic polylogarithms and iterated integrals on elliptic curves. Part I: general formalism

article Full Text OpenAlex 147 FWCI0

Breaking Rainbow Takes a Weekend on a Laptop

book-chapter Full Text OpenAlex 141 FWCI97.57267623

On the Security of Homomorphic Encryption on Approximate Numbers

book-chapter Full Text OpenAlex 134 FWCI32.57069367

Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs

article Full Text OpenAlex 126 FWCI13.82815037

High-Speed NTT-based Polynomial Multiplication Accelerator for Post-Quantum Cryptography

article Full Text OpenAlex 122 FWCI24.16380125

Cryptographic Accelerators for Digital Signature Based on Ed25519

article Full Text OpenAlex 120 FWCI30.2775341