Pages that link to "Item:Q6083674"
From MaRDI portal
The following pages link to A direct key recovery attack on SIDH (Q6083674):
Displaying 34 items.
- A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks (Q3627450) (← links)
- An efficient key recovery attack on SIDH (Q6083671) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- Efficiency of SIDH-based signatures (yes, SIDH) (Q6193385) (← links)
- Efficient computation of \((2^n, 2^n)\)-isogenies (Q6544473) (← links)
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees (Q6544474) (← links)
- Exploring SIDH-based signature parameters (Q6547992) (← links)
- New SIDH countermeasures for a more efficient key exchange (Q6562585) (← links)
- On the multi-user security of LWE-based NIKE (Q6587945) (← links)
- Round-robin is optimal: lower bounds for group action based protocols (Q6587957) (← links)
- Robustly reusable fuzzy extractor from isogeny (Q6589832) (← links)
- \textsf{FESTA}: fast encryption from supersingular torsion attacks (Q6595918) (← links)
- A polynomial time attack on instances of M-SIDH and FESTA (Q6595919) (← links)
- Cryptographic smooth neighbors (Q6595923) (← links)
- Pseudorandomness of decoding, revisited: adapting OHCP to code-based cryptography (Q6595926) (← links)
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith (Q6604865) (← links)
- A note on \((2, 2)\)-isogenies via theta coordinates (Q6615553) (← links)
- Towards a quantum-resistant weak verifiable delay function (Q6619929) (← links)
- A post-quantum round-optimal oblivious PRF from isogenies (Q6620041) (← links)
- Finding orientations of supersingular elliptic curves and quaternion orders (Q6632044) (← links)
- CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist (Q6632052) (← links)
- An algorithm for efficient detection of \((N, N)\)-splittings and its application to the isogeny problem in dimension 2 (Q6635823) (← links)
- SCALLOP-HD: group action from 2-dimensional isogenies (Q6635824) (← links)
- New proof systems and an OPRF from CSIDH (Q6635825) (← links)
- SQIsignHD: new dimensions in cryptography (Q6636383) (← links)
- The supersingular endomorphism ring and one endomorphism problems are equivalent (Q6637577) (← links)
- Isogeny problems with level structure (Q6637719) (← links)
- Adding level structure to supersingular elliptic curve isogeny graphs (Q6642855) (← links)
- Lossy cryptography from code-based assumptions (Q6652889) (← links)
- QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras (Q6652961) (← links)
- Radical \(\sqrt[N]{\text{élu}}\) isogeny formulae (Q6652962) (← links)
- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves (Q6652968) (← links)
- Climbing and descending tall isogeny volcanos (Q6653361) (← links)
- Computing modular polynomials by deformation (Q6653364) (← links)