Pages that link to "Item:Q6083671"
From MaRDI portal
The following pages link to An efficient key recovery attack on SIDH (Q6083671):
Displaying 49 items.
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH (Q6041287) (← links)
- A direct key recovery attack on SIDH (Q6083674) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- Automorphisms of the supersingular isogeny graph (Q6185634) (← links)
- Compact password authenticated key exchange from group actions (Q6535486) (← links)
- CSI-SharK: CSI-FiSh with sharing-friendly keys (Q6535498) (← links)
- Efficient computation of \((2^n, 2^n)\)-isogenies (Q6544473) (← links)
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees (Q6544474) (← links)
- Exploring SIDH-based signature parameters (Q6547992) (← links)
- Post-quantum \(\kappa\)-to-1 trapdoor claw-free functions from extrapolated dihedral cosets (Q6550807) (← links)
- New SIDH countermeasures for a more efficient key exchange (Q6562585) (← links)
- Cryptographic group and semigroup actions (Q6580111) (← links)
- Semidirect product key exchange: the state of play (Q6580195) (← links)
- On the multi-user security of LWE-based NIKE (Q6587945) (← links)
- Round-robin is optimal: lower bounds for group action based protocols (Q6587957) (← links)
- Robustly reusable fuzzy extractor from isogeny (Q6589832) (← links)
- Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH (Q6595808) (← links)
- \textsf{FESTA}: fast encryption from supersingular torsion attacks (Q6595918) (← links)
- A polynomial time attack on instances of M-SIDH and FESTA (Q6595919) (← links)
- Cryptographic smooth neighbors (Q6595923) (← links)
- Pseudorandomness of decoding, revisited: adapting OHCP to code-based cryptography (Q6595926) (← links)
- Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography (Q6601511) (← links)
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith (Q6604865) (← links)
- A note on \((2, 2)\)-isogenies via theta coordinates (Q6615553) (← links)
- Towards a quantum-resistant weak verifiable delay function (Q6619929) (← links)
- Composable oblivious pseudo-random functions via garbled circuits (Q6619935) (← links)
- A post-quantum round-optimal oblivious PRF from isogenies (Q6620041) (← links)
- Traceable ring signatures from group actions: logarithmic, flexible, and quantum resistant (Q6620043) (← links)
- Generating supersingular elliptic curves over \(\mathbb{F}_p\) with unknown endomorphism ring (Q6623299) (← links)
- VDOO: a short, fast, post-quantum multivariate digital signature scheme (Q6623354) (← links)
- Finding orientations of supersingular elliptic curves and quaternion orders (Q6632044) (← links)
- CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist (Q6632052) (← links)
- An algorithm for efficient detection of \((N, N)\)-splittings and its application to the isogeny problem in dimension 2 (Q6635823) (← links)
- SCALLOP-HD: group action from 2-dimensional isogenies (Q6635824) (← links)
- New proof systems and an OPRF from CSIDH (Q6635825) (← links)
- SQIsignHD: new dimensions in cryptography (Q6636383) (← links)
- The supersingular endomorphism ring and one endomorphism problems are equivalent (Q6637577) (← links)
- Isogeny problems with level structure (Q6637719) (← links)
- Adding level structure to supersingular elliptic curve isogeny graphs (Q6642855) (← links)
- Lossy cryptography from code-based assumptions (Q6652889) (← links)
- How to construct quantum FHE, generically (Q6652899) (← links)
- QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras (Q6652961) (← links)
- Radical \(\sqrt[N]{\text{élu}}\) isogeny formulae (Q6652962) (← links)
- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves (Q6652968) (← links)
- CryptAttackTester: high-assurance attack analysis (Q6652984) (← links)
- Climbing and descending tall isogeny volcanos (Q6653361) (← links)
- Computing modular polynomials by deformation (Q6653364) (← links)
- SAT solving using XOR-OR-AND normal forms. (Q6653668) (← links)