Zobrazeno 1 - 10
of 42
pro vyhledávání: '"Peter B. Rønne"'
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
Commutative Supersingular Isogeny Diffie-Hellman (or CSIDH for short) is a recently-proposed post-quantum key establishment scheme that belongs to the family of isogeny-based cryptosystems. The CSIDH protocol is based on the action of an ideal class
Externí odkaz:
https://doaj.org/article/6cc0a36519764c8f8f1c47323bd8bdbd
Autor:
Fatima-Ezzahra El Orche, Marcel Hollenstein, Sarah Houdaigoui, David Naccache, Daria Pchelina, Peter B. Rønne, Peter Y. A. Ryan, Julien Weibel, Robert Weil
Publikováno v:
Lecture Notes in Networks and Systems ISBN: 9783031280726
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::7bce3dc1431bc469d159a29c6123bc08
https://doi.org/10.1007/978-3-031-28073-3_46
https://doi.org/10.1007/978-3-031-28073-3_46
Autor:
Fatima-Ezzahra El Orche, Rémi Géraud-Stewart, Peter B. Rønne, Gergei Bana, David Naccache, Peter Y. A. Ryan, Marco Biroli, Megi Dervishi, Hugo Waltsburger
Publikováno v:
Lecture Notes in Computer Science
International Joint Conference on Electronic Voting 2022
International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩
Electronic Voting ISBN: 9783031159107
International Joint Conference on Electronic Voting 2022
International Joint Conference on Electronic Voting 2022, Oct 2022, Bregenz, Austria. pp.19-35, ⟨10.1007/978-3-031-15911-4_2⟩
Electronic Voting ISBN: 9783031159107
The open vote network ( [10]) is a secure two-round multi-party protocol facilitating the computation of a sum of integer votes without revealing their individual values. This is done without a central authority trusted for privacy, and thus allows d
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::e3d3be7823dd1f04c9ba16f850f034d7
https://cnrs.hal.science/hal-03913581
https://cnrs.hal.science/hal-03913581
Publikováno v:
DATE
Introduced in 1996, NTRUEncrypt is not only one of the earliest but also one of the most scrutinized lattice-based cryptosystems and expected to remain secure in the upcoming era of quantum computing. Furthermore, NTRUEncrypt offers some efficiency b
Publikováno v:
Lecture Notes in Computer Science ISBN: 9783662639573
Financial Cryptography Workshops
Financial Cryptography Workshops
Verifiable voting systems allow voters to check whether their ballot is correctly recorded (individual verifiability) and allow anyone to check whether votes expressed in recorded ballots are correctly counted (universal verifiability). This suffices
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::13ac62f1bc1cafc1c021eecb5078c75f
https://doi.org/10.1007/978-3-662-63958-0_22
https://doi.org/10.1007/978-3-662-63958-0_22
Autor:
Georgios Fotiadis, José Moreira, Thanassis Giannetsos, Liqun Chen, Peter B. Rønne, Mark D. Ryan, Peter Y. A. Ryan
Publikováno v:
Security and Trust Management ISBN: 9783030918583
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Trust Management
Security and Trust Management: 17th International Workshop
Lecture Notes in Computer Science
Lecture Notes in Computer Science-Security and Trust Management
Security and Trust Management: 17th International Workshop
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::ec701290009c49538059acf9e2288837
https://doi.org/10.1007/978-3-030-91859-0_9
https://doi.org/10.1007/978-3-030-91859-0_9
Publikováno v:
Smart Card Research and Advanced Applications ISBN: 9783030684860
CARDIS
CARDIS
Recent progress in quantum computing has increased interest in the question of how well the existing proposals for post-quantum cryptosystems are suited to replace RSA and ECC. While some aspects of this question have already been researched in detai
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::8d2fd9682c1ac746c2453c6078d875a2
https://doi.org/10.1007/978-3-030-68487-7_2
https://doi.org/10.1007/978-3-030-68487-7_2
Publikováno v:
info:eu-repo/grantAgreement/EC/H2020/779391
Selected Areas in Cryptography ISBN: 9783030816513
SAC
Selected Areas in Cryptography ISBN: 9783030816513
SAC
Single Instruction Multiple Data (SIMD) execution engines like Intel’s Advanced Vector Extensions 2 (AVX2) offer a great potential to accelerate elliptic curve cryptography compared to implementations using only basic x64 instructions. All existing
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::8524af23b43f02caeae37eae4bbe8979
https://doi.org/10.5281/zenodo.4263826
https://doi.org/10.5281/zenodo.4263826
Publikováno v:
Lecture Notes in Computer Science
13th IFIP International Conference on Information Security Theory and Practice (WISTP)
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.103-119, ⟨10.1007/978-3-030-41702-4_7⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
info:eu-repo/grantAgreement/EC/H2020/779391
13th IFIP International Conference on Information Security Theory and Practice (WISTP)
13th IFIP International Conference on Information Security Theory and Practice (WISTP), Dec 2019, Paris, France. pp.103-119, ⟨10.1007/978-3-030-41702-4_7⟩
Information Security Theory and Practice ISBN: 9783030417017
WISTP
info:eu-repo/grantAgreement/EC/H2020/779391
Part 3: Cryptography; International audience; The dawning era of quantum computing has initiated various initiatives for the standardization of post-quantum cryptosystems with the goal of (eventually) replacing RSA and ECC. NTRU Prime is a variant of
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b3905d53e09e3893dd97064235071a5
https://doi.org/10.5281/zenodo.3952246
https://doi.org/10.5281/zenodo.3952246
Publikováno v:
CSF
In e-voting protocols, cryptographers must balance usability with strong security guarantees, such as privacy and verifiability. In traditional e-voting protocols, privacy is often provided by a trusted authority that learns the votes and computes th
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::0b1ada3660c7928ebfb5e8b52939fd65
http://orbilu.uni.lu/handle/10993/44191
http://orbilu.uni.lu/handle/10993/44191