Pages that link to "Item:Q742016"
From MaRDI portal
The following pages link to Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies (Q742016):
Displaying 50 items.
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece'' hardware reference implementation (Q2692373) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601) (← links)
- Isogeny-Based Quantum-Resistant Undeniable Signatures (Q2938682) (← links)
- On the Security of Supersingular Isogeny Cryptosystems (Q2958115) (← links)
- On Fast Calculation of Addition Chains for Isogeny-Based Cryptography (Q2980864) (← links)
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA (Q3179485) (← links)
- Ramanujan Graphs in Cryptography (Q3296195) (← links)
- Cycles in the Supersingular ℓ-Isogeny Graph and Corresponding Endomorphisms (Q3296197) (← links)
- Limonnitsa: making Limonnik-3 post-quantum (Q3383104) (← links)
- Ramanujan Graphs for Post-Quantum Cryptography (Q4964366) (← links)
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions (Q4964367) (← links)
- Improved supersingularity testing of elliptic curves (Q5000100) (← links)
- Explicit Arithmetic on Abelian Varieties (Q5014830) (← links)
- Fast computation of elliptic curve isogenies in characteristic two (Q5034139) (← links)
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems (Q5040377) (← links)
- Cyclic Isogenies for Abelian Varieties with Real Multiplication (Q5047978) (← links)
- Radical Isogenies on Montgomery Curves (Q5087267) (← links)
- Supersingular Isogeny-based Cryptography: A Survey (Q5158416) (← links)
- Curves, Jacobians, and cryptography (Q5236869) (← links)
- Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography (Q5267802) (← links)
- Constructing elliptic curve isogenies in quantum subexponential time (Q5396023) (← links)
- Efficient Compression of SIDH Public Keys (Q5738894) (← links)
- Counting Richelot isogenies between superspecial abelian surfaces (Q5853803) (← links)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies (Q5854432) (← links)
- High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications (Q5862340) (← links)
- Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph (Q5880205) (← links)
- Identification protocols and signature schemes based on supersingular isogeny problems (Q5919490) (← links)
- Séta: Supersingular Encryption from Torsion Attacks (Q6041286) (← links)
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH (Q6041287) (← links)
- Proving knowledge of isogenies: a survey (Q6063129) (← links)
- An efficient key recovery attack on SIDH (Q6083671) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- Accelerating the Delfs-Galbraith algorithm with fast subfield root detection (Q6108984) (← links)
- SIDH proof of knowledge (Q6132414) (← links)
- Full quantum equivalence of group action DLog and CDH, and more (Q6135389) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- Parallel isogeny path finding with limited memory (Q6169469) (← links)
- Automorphisms of the supersingular isogeny graph (Q6185634) (← links)
- Efficiency of SIDH-based signatures (yes, SIDH) (Q6193385) (← links)
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT (Q6488028) (← links)
- Deuring for the people: supersingular elliptic curves with prescribed endomorphism ring in general characteristic (Q6494753) (← links)
- Practical robust DKG protocols for CSIDH (Q6535118) (← links)
- Efficient isogeny proofs using generic techniques (Q6535120) (← links)
- Efficient computation of \((2^n, 2^n)\)-isogenies (Q6544473) (← links)
- Exploring SIDH-based signature parameters (Q6547992) (← links)
- Cryptographic group and semigroup actions (Q6580111) (← links)