A key manipulation attack on some recent isogeny-based key agreement protocols
From MaRDI portal
Publication:2119312
DOI10.1007/s41980-021-00534-6zbMath1486.94103OpenAlexW3135175899MaRDI QIDQ2119312
Osmanbey Uzunkol, Seher Tutdere, Mehmet Gönen
Publication date: 29 March 2022
Published in: Bulletin of the Iranian Mathematical Society (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s41980-021-00534-6
Cryptography (94A60) Direct numerical methods for linear systems and matrix inversion (65F05) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Improved algorithm for the isogeny problem for ordinary elliptic curves
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Fault attack on supersingular isogeny cryptosystems
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- An efficient protocol for authenticated key agreement
- Endomorphisms of Abelian varieties over finite fields
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
- The Arithmetic of Elliptic Curves
- New directions in cryptography
- Constructing elliptic curve isogenies in quantum subexponential time
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- SAGE
This page was built for publication: A key manipulation attack on some recent isogeny-based key agreement protocols