Pages that link to "Item:Q1994699"
From MaRDI portal
The following pages link to Computational problems in supersingular elliptic curve isogenies (Q1994699):
Displaying 20 items.
- An efficient authenticated key exchange from random self-reducibility on CSIDH (Q831632) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Orienting supersingular isogeny graphs (Q2025334) (← links)
- Algebraic approaches for solving isogeny problems of prime power degrees (Q2027266) (← links)
- Delay encryption (Q2056688) (← links)
- General linear group action on tensors: a candidate for post-quantum cryptography (Q2175914) (← links)
- The security of all private-key bits in isogeny-based schemes (Q2185742) (← links)
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action (Q2191211) (← links)
- Eliptic curves in post-quantum cryptography (Q2315804) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601) (← links)
- The elliptic scalar multiplication graph and its application in elliptic curve cryptography (Q5035840) (← links)
- Constructing elliptic curve isogenies in quantum subexponential time (Q5396023) (← links)
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs (Q5853799) (← links)
- An efficient key recovery attack on SIDH (Q6083671) (← links)
- SIDH proof of knowledge (Q6132414) (← links)
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT (Q6488028) (← links)
- \textsf{FESTA}: fast encryption from supersingular torsion attacks (Q6595918) (← links)
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE (Q6619847) (← links)