Resistance of isogeny-based cryptographic implementations to a fault attack
From MaRDI portal
Publication:2145308
DOI10.1007/978-3-030-89915-8_12zbMath1491.94067OpenAlexW3185958608MaRDI QIDQ2145308
Simon Pontié, Élise Tasso, Luca De Feo, Nadia El Mrabet
Publication date: 17 June 2022
Full work available at URL: https://hal-cea.archives-ouvertes.fr/cea-03266892/file/resistance_of_isogeny-based_cryptographic_implementations_to_a_fault_attack_eprint.pdf
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (3)
Safe-error attacks on SIKE and CSIDH ⋮ Disorientation faults in CSIDH ⋮ Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Faster isogeny-based compressed key agreement
- Loop-abort faults on supersingular isogeny cryptosystems
- Fault attack on supersingular isogeny cryptosystems
- A modular analysis of the Fujisaki-Okamoto transformation
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The Arithmetic of Elliptic Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
- Efficient Compression of SIDH Public Keys
This page was built for publication: Resistance of isogeny-based cryptographic implementations to a fault attack