Author:
Costello Craig,Hisil Huseyin
Publisher
Springer International Publishing
Reference43 articles.
1. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - A new hope. In: Holz, T., Savage, S. (eds.) 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10–12 August 2016, pp. 327–343. USENIX Association (2016)
2. Azarderakhsh, R., Jao, D., Kalach, K., Koziel, B., Leonardi, C.: Key compression for isogeny-based cryptosystems. In: Emura, K., Hanaoka, G., Zhang, R. (eds.) Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, AsiaPKC@AsiaCCS, Xi’an, China, 30 May–03 June 2016, pp. 1–10. ACM (2016)
3. Lecture Notes in Computer Science;DJ Bernstein,2008
4. Bernstein, D.J., Buchmann, J., Dahmen, E.: Post-Quantum Cryptography. Springer Science & Business Media, Heidelberg (2009). https://doi.org/10.1007/978-3-540-88702-7
5. Lecture Notes in Computer Science;DJ Bernstein,2013
Cited by
73 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Post-Quantunm Scheme using Montgomery+ curves;2024 IEEE 6th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC);2024-05-24
2. Montgomery curve arithmetic revisited;Journal of Cryptographic Engineering;2024-05-13
3. Computing 2-isogenies between Kummer lines;IACR Communications in Cryptology;2024-04-09
4. On the Parallelization of Square-Root Vélu’s Formulas;Mathematical and Computational Applications;2024-02-16
5. AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing;Lecture Notes in Computer Science;2024