专题:Cryptography and Residue Arithmetic

This cluster of papers explores the applications, algorithms, and implementations of elliptic curve cryptography, with a focus on pairing-based cryptosystems, efficient algorithms for finite fields, quantum-resistant cryptosystems, and protection against side-channel attacks. It also covers hardware implementations and the use of elliptic curves in public key encryption.
最新文献
Chipkill-Level ECC Using 4-Bit Symbol Reed-Solomon Codes for DDR5 DRAM

article Full Text OpenAlex

Beyond the Breaker: Evaluating Post-Quantum Cryptographic Algorithms for Practical Smart Grid Deployment

article Full Text OpenAlex

Single-trace Side-Channel Attacks on MAYO Exploiting Leaky Modular Multiplication

article Full Text OpenAlex

KNightCore: An Ultra-Lightweight NTT-Based Polynomial Multiplier for ML-KEM on Resource-Constrained Platforms

article Full Text OpenAlex

Implementing Parallel Counters Based on Sorting Networks

article Full Text OpenAlex

New genetic algorithm combined with three Feistel towers acting at the RNA level for the encryption of medical images

article Full Text OpenAlex

Optimizing FHE-Based Secure Matrix Computation for Untrusted Cloud Environments

article Full Text OpenAlex

Securing Electronic Patient Health Information (ePHI): An Analysis of Data Security and Compliance with Privacy Regulations

article Full Text OpenAlex

Unique expansions in number systems via refinement equations

article Full Text OpenAlex

Sequenze di Primi Uniche e Rigidità Strutturale The Universal Uniqueness Theorem

preprint Full Text OpenAlex

近5年高被引文献
Status report on the third round of the NIST Post-Quantum Cryptography Standardization process

report Full Text OpenAlex 355 FWCI0

An Efficient Key Recovery Attack on SIDH

book-chapter Full Text OpenAlex 237 FWCI175.6907

Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey

article Full Text OpenAlex 167 FWCI50.9579

Breaking Rainbow Takes a Weekend on a Laptop

book-chapter Full Text OpenAlex 150 FWCI95.5891

Elliptic polylogarithms and iterated integrals on elliptic curves. Part I: general formalism

article Full Text OpenAlex 146 FWCI0

ARK: Fully Homomorphic Encryption Accelerator with Runtime Data Generation and Inter-Operation Key Reuse

preprint Full Text OpenAlex 125 FWCI15.1717

A Direct Key Recovery Attack on SIDH

book-chapter Full Text OpenAlex 110 FWCI82.8103

FAB: An FPGA-based Accelerator for Bootstrappable Fully Homomorphic Encryption

article Full Text OpenAlex 107 FWCI18.5686

Factorials and Integers for Applications in Computing and Cryptography

preprint Full Text OpenAlex 91 FWCI11.2650539

Indistinguishability Obfuscation from LPN over $$\mathbb {F}_p$$, DLIN, and PRGs in NC$$^0$$

book-chapter Full Text OpenAlex 90 FWCI29.4874