Digital Library


Search: "[ keyword: isogeny-based cryptography ]" (6)
    A Study on Efficient Signing Methods and Optimal Parameters Proposal for SeaSign Implementation
    , Vol. 34, No. 2, pp. 167-177, Apr. 2024
    10.13089/JKIISC.2024.34.2.167

    Implementing M-SIDH: Performance and Efficiency Evaluation
    , , Vol. 33, No. 4, pp. 591-599, Aug. 2023
    10.13089/JKIISC.2023.33.4.591

    , Vol. 31, No. 6, pp. 1137-1148, Dec. 2021
    10.13089/JKIISC.2021.31.6.1137

    , Vol. 31, No. 3, pp. 497-508, Jun. 2021
    10.13089/JKIISC.2021.31.3.497

    On the Use of Odd-Degree Isogenies for Implementing SIDH-Based Cryptography
    김수리, 윤기순, 박영호, Vol. 31, No. 1, pp. 19-30, Feb. 2021
    10.13089/JKIISC.2021.31.1.19
    Keywords: Post-Quantum Cryptography, isogeny-based cryptography, SIDH, Post-Quantum Cryptography, isogeny-based cryptography, SIDH

    An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
    Kisoon Yoon, Jun Yeong Lee, Suhri Kim, Jihoon Kwon, Young-Ho Park, Vol. 28, No. 1, pp. 73-83, Feb. 2018
    10.13089/JKIISC.2018.28.1.73
    Keywords: supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography, supersingular isogeny Diffie-Hellman, isogeny-based cryptography, Post-Quantum Cryptography