A note on the security of CSIDH
From MaRDI portal
Publication:1738052
DOI10.1007/978-3-030-05378-9_9zbMath1407.81083arXiv1806.03656OpenAlexW2807702307MaRDI QIDQ1738052
Annamaria Iezzi, Jean-François Biasse, Michael J. Jacobson jun.
Publication date: 29 March 2019
Full work available at URL: https://arxiv.org/abs/1806.03656
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Theta functions and curves; Schottky problem (14H42) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (10)
On the hardness of the computational ring-LWR problem and its applications ⋮ New techniques for SIDH-based NIKE ⋮ A subexponential-time, polynomial quantum space algorithm for inverting the CM group action ⋮ Orienteering with one endomorphism ⋮ Cryptographic group actions and applications ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ A trade-off between classical and quantum circuit size for an attack against CSIDH ⋮ Threshold schemes from isogeny assumptions ⋮ He gives C-sieves on the CSIDH ⋮ Quantum security analysis of CSIDH
This page was built for publication: A note on the security of CSIDH