The following pages link to A faster way to the CSIDH (Q1738050):
Displaying 26 items.
- How to construct CSIDH on Edwards curves (Q785039) (← links)
- A simple and compact algorithm for SIDH with arbitrary degree isogenies (Q1703926) (← links)
- Threshold schemes from isogeny assumptions (Q2055691) (← links)
- CSURF-TWO: CSIDH for the ratio \((2:1)\) (Q2057141) (← links)
- Optimal strategies for CSIDH (Q2085717) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- Quantum security analysis of CSIDH (Q2119022) (← links)
- (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH (Q2128759) (← links)
- An isogeny-based ID protocol using structured public keys (Q2149792) (← links)
- Fully projective radical isogenies in constant-time (Q2152151) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293) (← links)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space (Q2685697) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Radical isogenies (Q2692393) (← links)
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF (Q2692395) (← links)
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems (Q5040377) (← links)
- How to construct CSIDH on Edwards curves (Q6063264) (← links)
- CSI-SharK: CSI-FiSh with sharing-friendly keys (Q6535498) (← links)
- A review of mathematical and computational aspects of CSIDH algorithms (Q6580190) (← links)
- \textsf{FESTA}: fast encryption from supersingular torsion attacks (Q6595918) (← links)
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE (Q6619847) (← links)
- Effective pairings in isogeny-based cryptography (Q6619926) (← links)
- AprèsSQI: extra fast verification for SQIsign using extension-field signing (Q6636385) (← links)