搜索结果: 1-15 共查到“军事学 Points”相关记录15条 . 查询时间(0.125 秒)
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points
CSIDH post-quantum cryptography Isogeny-based cryptography
2019/4/3
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptograp...
We investigate the differential properties of a construction in which a given function F:F2n→F2nF:F2n→F2n is modified at K∈NK∈N points in order to obtain a new function GG. This is motivated by the qu...
Compression for trace zero points on twisted Edwards curves
elliptic curve cryptography trace-zero subgroup Edwards curves
2017/9/18
We propose two optimal representations for the elements of trace zero subgroups of twisted Edwards curves. For both representations, we provide efficient compression and decompression algorithms. The ...
Elligator Squared: Uniform Points on Elliptic Curves of Prime Order as Uniform Random Strings
Elliptic curve cryptography Point encoding Circumvention technology
2016/1/26
When represented as a bit string in a standard way, even using point compression, an
elliptic curve point is easily distinguished from a random bit string. This property potentially allows
an advers...
How to Choose Interesting Points for Template Attacks?
Side-Channel Attacks Power Analysis Attacks Profiled Side-Channel Attacks
2016/1/9
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view.
For template attacks, many papers suggested a guideline for choosing
i...
How to Choose Interesting Points for Template Attacks More Effectively
Side-Channel Attacks Power Analysis Attacks Template Attacks
2016/1/6
Template attacks are widely accepted to be the most powerful
side-channel attacks from an information theoretic point of view. For
template attacks to be practical, one needs to choose some special ...
From Improved Leakage Detection to the Detection of Points of Interests in Leakage Traces
implementation side-channel measurements
2015/12/30
Leakage detection usually refers to the task of identifying
data-dependent information in side-channel measurements, independent
of whether this information can be exploited. Detecting Points-Of-Int...
One of the criteria for substitutions used in block ciphers is the absence of fixed points. In this paper we show that this criterion must be extended taking into consideration a mixing key function. ...
Elligator: Elliptic-curve points indistinguishable from uniform random strings
Censorship circumvention elliptic curves
2014/3/12
Censorship-circumvention tools are in an arms race against censors. The censors study all traffic passing into and out of their controlled sphere, and try to disable censorship-circumvention tools wit...
Counting Points on Genus 2 Curves with Real Multiplication
2 Curves Real Multiplication Counting Points
2011/7/25
We present an accelerated Schoof-type point-counting algorithm for curves of genus 2 equipped with an efficiently computable real multiplication endomorphism.
We present an accelerated Schoof-type point-counting algorithm for curves of genus 2 equipped with an efficiently computable real multiplication endomorphism. Our new algorithm reduces the complexity ...
Counting Points on Genus 2 Curves with Real Multiplication
finite field algorithm prime-order Jacobian
2011/6/9
We present an accelerated Schoof-type point-counting algorithm for curves of genus 2 equipped with an efficiently computable real multiplication endomorphism. Our new algorithm reduces the complexity ...
Counting Points for Hyperelliptic Curves of type y2 = x5 + ax over Finite Prime Fields
Hyperelliptic Curves Finite Prime Fields
2009/4/15
Counting rational points on Jacobian varieties of hyperelliptic
curves over finite fields is very important for constructing hyperelliptic
curve cryptosystems (HCC), but known algorithms for general...
Counting points on elliptic curves in medium characteristic
finite fields elliptic curves separable isogenies point counting
2008/11/24
In this paper, we revisit the problem of computing the kernel
of a separable isogeny of degree ` between two elliptic curves defined
over a finite field Fq of characteristic p. We describe an algori...
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP
PRIME POINTS ELLIPTIC CURVES ECDLP
2008/9/10
PRIME POINTS ON ELLIPTIC CURVES AND ITS IMPACT ON ECDLP.