Natanael

joined 2 months ago
[–] [email protected] 1 points 6 hours ago

The API has the wrong abstraction and the type definitions fail to capture necessary information (such as in which year you were of the given age) and thus conversions can not be guaranteed to be correct

 

Abstract;

In this paper, we present the first practical algorithm to compute an effective group action of the class group of any imaginary quadratic order O on a set of supersingular elliptic curves primitively oriented by O. Effective means that we can act with any element of the class group directly, and are not restricted to acting by products of ideals of small norm, as for instance in CSIDH. Such restricted effective group actions often hamper cryptographic constructions, e.g. in signature or MPC protocols.

Our algorithm is a refinement of the Clapoti approach by Page and Robert, and uses 4-dimensional isogenies. As such, it runs in polynomial time, does not require the computation of the structure of the class group, nor expensive lattice reductions, and our refinements allows it to be instantiated with the orientation given by the Frobenius endomorphism. This makes the algorithm practical even at security levels as high as CSIDH-4096. Our implementation in SageMath takes 1.5s to compute a group action at the CSIDH-512 security level, 21s at CSIDH-2048 level and around 2 minutes at the CSIDH-4096 level. This marks the first instantiation of an effective cryptographic group action at such high security levels. For comparison, the recent KLaPoTi approach requires around 200s at the CSIDH-512 level in SageMath and 2.5s in Rust.

See also; https://bsky.app/profile/andreavbasso.bsky.social/post/3ljkh4wmnqk2c

[–] [email protected] 14 points 13 hours ago

How to we know what to test? Maybe with some kind of specification?

[–] [email protected] 1 points 16 hours ago

Pretty sure most of those university board members are conservative

0
🕵️‍♂️ (infosec.pub)
submitted 19 hours ago* (last edited 19 hours ago) by [email protected] to c/[email protected]
 
[–] [email protected] 9 points 1 day ago (2 children)

It's not really. Worldwide population is still growing. Countries which are simultaneously highly developed and not incentivizing child birth have low birth rates.

[–] [email protected] 2 points 2 days ago* (last edited 2 days ago)

Those methods of alleviation are exactly what Trumpists are banning and prohibiting

[–] [email protected] 4 points 3 days ago

Seasonal opening hours are not something new.

[–] [email protected] 23 points 6 days ago (1 children)
[–] [email protected] 12 points 6 days ago

In Denmark they had to bribe homeless people

[–] [email protected] 1 points 6 days ago (1 children)

Bot finally responded - but what's the correct community name format it needs to set rules?

[–] [email protected] 14 points 1 week ago

It depends! Sometimes it's autoimmune, sometimes it's lingering virus, sometimes it's disrupted regulatory systems, etc. When it's the immune system or lingering virus, a new vaccine can often get the immune system to relearn how to correctly handle the virus

[–] [email protected] 4 points 1 week ago

Don't mistake their pro Israel takes for being "not antisemitic". They're pro Israel to have a place to deport jews to. That's extremely antisemitic. They're calling jews who disagree with Netanyahu and who want peace "bad jews".

[–] [email protected] 19 points 1 week ago

End-to-end-to-editor encryption

 

Via; https://bsky.app/profile/nicksullivan.org/post/3ll7galasrc2z

CFRG process documentation has been updated.

 

From: https://mastodon.social/@fj/114171907451597856

Interesting paper co-authored by Airbus cryptographer Erik-Oliver Blass on using zero-knowledge proofs in flight control systems.

Sensors would authenticate their measurements, the control unit provides in each iteration control outputs together with a proof of output correctness (reducing the need in some cases for redundant computations), and actuators verify that outputs have been correctly computed

 

"The GSM Association announced that the latest RCS standard includes E2EE based on the Messaging Layer Security (MLS) protocol, enabling interoperable encryption between different platform providers for the first time"

 

HQC gets standardized, as an addition to ML-KEM (kyber). McEliece is out of the NIST process for two reasons, they consider it unlikely to be widely used, also ISO is considering standardizing it and they don't want to create an incompatible standard. If ISO does standardize it and it does see use, NIST is considering mirroring that standard (since lots of US agencies are bound to using NIST standards)

view more: next ›