Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
From MaRDI portal
Publication:2104421
DOI10.1007/978-3-031-08896-4_5OpenAlexW3204663670MaRDI QIDQ2104421
Robi Pedersen, Osmanbey Uzunkol
Publication date: 7 December 2022
Full work available at URL: https://doi.org/10.1007/978-3-031-08896-4_5
post-quantum cryptographylightweight cryptographyisogeny-based cryptographysecure computation outsourcing
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Computer security (68M25)
Related Items (1)
Uses Software
Cites Work
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- Improved classical cryptanalysis of SIKE in practice
- An alternative approach for SIDH arithmetic
- Improved torsion-point attacks on SIDH variants
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Verifiable delay functions from supersingular isogenies and pairings
- SQISign: compact post-quantum signatures from quaternions and isogenies
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- How to Hash into Elliptic Curves
- Twisted Edwards Curves
- Twisted Edwards Curves Revisited
- The Arithmetic of Elliptic Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Theory of Cryptography
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications