Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves
A Bessalov, S Abramov, V Sokolov… - … , Quantum, and Post …, 2023 - elibrary.kubg.edu.ua
A multifunctional cryptosystem RCNIE on isogenies of non-supersingular Edwards curves is
proposed, which solves the problems of Diffie-Hellman secret sharing, digital signature, and …
proposed, which solves the problems of Diffie-Hellman secret sharing, digital signature, and …
[HTML][HTML] Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves
A Bessalov, V Sokolov, S Abramov - Cryptography, 2024 - mdpi.com
The article presents the author's works in the field of modifications and modeling of the Post-
Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) …
Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) …
[PDF][PDF] Families of Square Commutative 2х2 Matrices
A Shcherba, E Faure, A Skutskyi… - Cybersecurity Providing in …, 2023 - ceur-ws.org
The objective of this study is to define and investigate the families of square matrices of
order 2 with a commutative multiplication operation to be used in cryptographic information …
order 2 with a commutative multiplication operation to be used in cryptographic information …
[PDF][PDF] Remote Object Confidential Control Technology based on Elliptic Cryptography.
V Poltorak, B Zhurakovskyi, V Saiko, T Loktikova… - CPITS II, 2023 - ceur-ws.org
Data such as commands for controlling a remote mobile object and data on the state of its
systems and subsystems are critical for successful, reliable, and unhindered control of it by …
systems and subsystems are critical for successful, reliable, and unhindered control of it by …
Properties of Isogeny Graph of Non-Cyclic Edwards Curves
S Abramov, A Bessalov… - Cybersecurity Providing in …, 2023 - elibrary.kubg.edu.ua
Some properties of isogenies of non-cyclic supersingular Edwards curves, which are used in
the implementation of the CSIDH algorithm, are considered. This article continues the …
the implementation of the CSIDH algorithm, are considered. This article continues the …
Implementing post-quantum KEMs: Practical challenges and solutions
P Vorobets, O Vakhula, A Horpenyuk… - … in Information and …, 2024 - elibrary.kubg.edu.ua
The paper provides an overview and analysis of the current state, problems, and prospects
of post-quantum key encapsulation mechanisms. The essential cryptographic building …
of post-quantum key encapsulation mechanisms. The essential cryptographic building …
Classical and post-quantum encryption for GDPR
In the dynamic digital landscape, the General Data Protection Regulation (GDPR) stands as
a transformative force, which aims to secure individual privacy and redefine organizational …
a transformative force, which aims to secure individual privacy and redefine organizational …
[PDF][PDF] Devices for Modularizing Numbers into a Square in Applications based on Public-Key Cryptography
Public-key cryptography solves the problem of key distribution, which is inherent in
symmetric cryptography. However, there are problems associated with the high resource …
symmetric cryptography. However, there are problems associated with the high resource …
[PDF][PDF] Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application
This study presents a comprehensive performance analysis of symmetric encryption
algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set …
algorithms in the context of time-critical cybersecurity applications. We evaluate a diverse set …
[PDF][PDF] Decoding the CRYSTALS-Kyber attack using artificial intelligence: Examination and strategies for resilience
The recent advancements in artificial intelligence and quantum computing pose a significant
threat to traditional public key cryptosystems. In this context, Kyber, a post-quantum …
threat to traditional public key cryptosystems. In this context, Kyber, a post-quantum …