Modeling UpLink power control with outage probabilities
Kenneth L. Clarkson, K. Georg Hampel, et al.
VTC Spring 2007
We introduce a new PKE protocol, POKE, based on isogenies of unknown degree. The protocol relies on two new techniques: the first constructs an SIDH square while also working with higher-dimensional representations, whereas the second allows us to obtain a shared secret even when all curves in the commutative diagram are known. The resulting protocol is compact and extremely efficient. We provide a proof-of-concept implementation in SageMath of POKE that shows encryption and decryption taking less than a hundred milliseconds: POKE is thus the most efficient encryption protocol from isogenies, and it outperforms existing protocols by more than an order of magnitude.
Kenneth L. Clarkson, K. Georg Hampel, et al.
VTC Spring 2007
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements
Ehud Altman, Kenneth R. Brown, et al.
PRX Quantum
R.B. Morris, Y. Tsuji, et al.
International Journal for Numerical Methods in Engineering