Pages that link to "Item:Q742016"
From MaRDI portal
The following pages link to Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies (Q742016):
Displaying 50 items.
- Modular polynomials on Hilbert surfaces (Q784730) (← links)
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Improved supersingularity testing of elliptic curves using Legendre form (Q831974) (← links)
- Trapdoor DDH groups from pairings and isogenies (Q832364) (← links)
- On isogeny graphs of supersingular elliptic curves over finite fields (Q1633305) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- On the statistical leak of the GGH13 multilinear map and some variants (Q1633467) (← links)
- Post-quantum key exchange for the Internet and the open quantum safe project (Q1698609) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Computing supersingular isogenies on Kummer surfaces (Q1710684) (← links)
- On the cost of computing isogenies between supersingular elliptic curves (Q1726684) (← links)
- Constructing canonical strategies for parallel implementation of isogeny based cryptography (Q1738054) (← links)
- Post-quantum static-static key agreement using multiple protocol instances (Q1746952) (← links)
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman (Q1746954) (← links)
- Efficient post-quantum undeniable signature on 64-bit ARM (Q1746974) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- Hash functions from superspecial genus-2 curves using Richelot isogenies (Q2023308) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Algebraic approaches for solving isogeny problems of prime power degrees (Q2027266) (← links)
- A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE (Q2027276) (← links)
- Isogenies on twisted Hessian curves (Q2040559) (← links)
- Constructing cycles in isogeny graphs of supersingular elliptic curves (Q2048187) (← links)
- Improved classical cryptanalysis of SIKE in practice (Q2055705) (← links)
- Delay encryption (Q2056688) (← links)
- Group key exchange protocols from supersingular isogenies (Q2057142) (← links)
- Isogeny-based key compression without pairings (Q2061915) (← links)
- Optimal strategies for CSIDH (Q2085717) (← links)
- Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications (Q2104421) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Memory optimization techniques for computing discrete logarithms in compressed SIKE (Q2118550) (← links)
- Quantum security analysis of CSIDH (Q2119022) (← links)
- A key manipulation attack on some recent isogeny-based key agreement protocols (Q2119312) (← links)
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3 (Q2129004) (← links)
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 (Q2145305) (← links)
- Faster isogenies for post-quantum cryptography: SIKE (Q2152149) (← links)
- Fully projective radical isogenies in constant-time (Q2152151) (← links)
- A new adaptive attack on SIDH (Q2152168) (← links)
- Safe-error attacks on SIKE and CSIDH (Q2154061) (← links)
- General linear group action on tensors: a candidate for post-quantum cryptography (Q2175914) (← links)
- Hilbert modular polynomials (Q2182178) (← links)
- The security of all private-key bits in isogeny-based schemes (Q2185742) (← links)
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves (Q2191198) (← links)
- New techniques for SIDH-based NIKE (Q2191209) (← links)
- Isogeny formulas for Jacobi intersection and twisted Hessian curves (Q2194515) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293) (← links)
- Supersingular twisted Edwards curves over prime fields. II: Supersingular twisted Edwards curves with the \(j\)-invariant equal to \(66^3\) (Q2287410) (← links)
- Bounds on short character sums and \(L\)-functions with characters to a powerful modulus (Q2299475) (← links)
- Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\) (Q2302571) (← links)
- Eliptic curves in post-quantum cryptography (Q2315804) (← links)