A faster way to the CSIDH
From MaRDI portal
Publication:1738050
DOI10.1007/978-3-030-05378-9_8zbMath1407.81087OpenAlexW2894497197MaRDI QIDQ1738050
Publication date: 29 March 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-05378-9_8
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Theta functions and curves; Schottky problem (14H42) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (17)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH ⋮ An isogeny-based ID protocol using structured public keys ⋮ An efficient post-quantum KEM from CSIDH ⋮ Disorientation faults in CSIDH ⋮ \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space ⋮ Cryptographic group actions and applications ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ Radical isogenies ⋮ SiGamal: a supersingular isogeny-based PKE and its application to a PRF ⋮ How to construct CSIDH on Edwards curves ⋮ How not to create an isogeny-based PAKE ⋮ Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors ⋮ Threshold schemes from isogeny assumptions ⋮ Optimal strategies for CSIDH ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH ⋮ Quantum security analysis of CSIDH
This page was built for publication: A faster way to the CSIDH