Post-quantum static-static key agreement using multiple protocol instances
From MaRDI portal
Publication:1746952
DOI10.1007/978-3-319-72565-9_3zbMath1384.94028OpenAlexW2776615543MaRDI QIDQ1746952
Reza Azarderakhsh, Christopher R. Leonardi, David D. W. Yao
Publication date: 26 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72565-9_3
Related Items (11)
Towards post-quantum security for signal's X3DH handshake ⋮ On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol ⋮ A new adaptive attack on SIDH ⋮ SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH ⋮ An efficient key recovery attack on SIDH ⋮ New techniques for SIDH-based NIKE ⋮ SIDH proof of knowledge ⋮ Attack on SHealS and HealS: the second wave of GPST ⋮ Post-quantum signal key agreement from SIDH ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ On the supersingular GPST attack
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Fault attack on supersingular isogeny cryptosystems
- Post-quantum RSA
- IND-CCA Secure Hybrid Encryption from QC-MDPC Niederreiter
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Lattice Cryptography for the Internet
- On the Security of Supersingular Isogeny Cryptosystems
- The Arithmetic of Elliptic Curves
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Secure integration of asymmetric and symmetric encryption schemes
- Efficient Compression of SIDH Public Keys
This page was built for publication: Post-quantum static-static key agreement using multiple protocol instances