A new adaptive attack on SIDH
From MaRDI portal
Publication:2152168
DOI10.1007/978-3-030-95312-6_14zbMath1492.94107OpenAlexW4210767037MaRDI QIDQ2152168
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_14
Related Items (4)
M-SIDH and MD-SIDH: countering SIDH attacks by masking information ⋮ A new isogeny representation and applications to cryptography ⋮ SIDH proof of knowledge ⋮ Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Low-gate quantum golden collision finding
- Cryptographic hash functions from expander graphs
- Nonsingular plane cubic curves over finite fields
- Parallel collision search with cryptanalytic applications
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- A modular analysis of the Fujisaki-Okamoto transformation
- Faster algorithms for isogeny problems using torsion point images
- Post-quantum static-static key agreement using multiple protocol instances
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Improved torsion-point attacks on SIDH variants
- New techniques for SIDH-based NIKE
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Mathematics of Public Key Cryptography
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The Arithmetic of Elliptic Curves
- Secure integration of asymmetric and symmetric encryption schemes
- Constructing elliptic curve isogenies in quantum subexponential time
- Supersingular curves with small noninteger endomorphisms
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: A new adaptive attack on SIDH