One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
From MaRDI portal
Publication:2056686
DOI10.1007/978-3-030-77870-5_9zbMath1479.94203OpenAlexW3158277682MaRDI QIDQ2056686
Simon-Philipp Merz, Charlotte Weitkämper, Péter Kutas, Christophe Petit
Publication date: 8 December 2021
Full work available at URL: https://research.birmingham.ac.uk/portal/en/publications/oneway-functions-and-malleability-oracles(75de4335-3cef-48f5-b826-adf1f295b03b).html
Related Items (4)
A new adaptive attack on SIDH ⋮ Orienteering with one endomorphism ⋮ A new isogeny representation and applications to cryptography ⋮ One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
Cites Work
- Unnamed Item
- Cryptographic hash functions from expander graphs
- Nonsingular plane cubic curves over finite fields
- A modular analysis of the Fujisaki-Okamoto transformation
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- On the quaternion -isogeny path problem
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The Arithmetic of Elliptic Curves
- Quaternion Algebras
- Constructing elliptic curve isogenies in quantum subexponential time
- Abelian varieties over finite fields
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols