On Lions and elligators: an efficient constant-time implementation of CSIDH
From MaRDI portal
Publication:2302141
DOI10.1007/978-3-030-25510-7_17OpenAlexW2962513145MaRDI QIDQ2302141
Publication date: 25 February 2020
Full work available at URL: https://doi.org/10.1007/978-3-030-25510-7_17
Related Items (15)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH ⋮ Fully projective radical isogenies in constant-time ⋮ Safe-error attacks on SIKE and CSIDH ⋮ Disorientation faults in CSIDH ⋮ \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space ⋮ SiGamal: a supersingular isogeny-based PKE and its application to a PRF ⋮ How to construct CSIDH on Edwards curves ⋮ How not to create an isogeny-based PAKE ⋮ Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors ⋮ Threshold schemes from isogeny assumptions ⋮ Compact, efficient and UC-secure isogeny-based oblivious transfer ⋮ CSIDH ⋮ Optimal strategies for CSIDH ⋮ Quantum security analysis of CSIDH
Uses Software
This page was built for publication: On Lions and elligators: an efficient constant-time implementation of CSIDH