Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman - MaRDI portal

Efficient Algorithms for Supersingular Isogeny Diffie-Hellman

From MaRDI portal
Publication:2835601

DOI10.1007/978-3-662-53018-4_21zbMath1384.94046OpenAlexW2495331295MaRDI QIDQ2835601

Craig Costello, Patrick Longa, Michael Naehrig

Publication date: 30 November 2016

Published in: Advances in Cryptology – CRYPTO 2016 (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-662-53018-4_21




Related Items (42)

A key manipulation attack on some recent isogeny-based key agreement protocolsMany a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key ExchangeThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3Improved supersingularity testing of elliptic curves using Legendre formOn the hardness of the computational ring-LWR problem and its applicationsOn the statistical leak of the GGH13 multilinear map and some variantsFast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGAFull key recovery side-channel attack against ephemeral SIKE on the cortex-M4Resistance of isogeny-based cryptographic implementations to a fault attackFaster isogenies for post-quantum cryptography: SIKEA new adaptive attack on SIDHAn efficient post-quantum KEM from CSIDHOptimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptographyThe security of all private-key bits in isogeny-based schemesBreaking SIDH in polynomial timeSpeeding-up parallel computation of large smooth-degree isogeny using precedence-constrained schedulingOn the Security of Supersingular Isogeny CryptosystemsPost-quantum key exchange for the Internet and the open quantum safe projectEfficiency of SIDH-based signatures (yes, SIDH)B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionCSIDH: an efficient post-quantum commutative group actionComputing supersingular isogenies on Kummer surfacesOn Fast Calculation of Addition Chains for Isogeny-Based CryptographyOn the cost of computing isogenies between supersingular elliptic curvesSIKE Round 2 Speed Record on ARM Cortex-M4How not to create an isogeny-based PAKEPost-quantum static-static key agreement using multiple protocol instancesSide-channel attacks on quantum-resistant supersingular isogeny Diffie-HellmanHILA5: on reliability, reconciliation, and error correction for Ring LWE encryptionEfficient post-quantum undeniable signature on 64-bit ARMComputational problems in supersingular elliptic curve isogeniesEfficient Compression of SIDH Public KeysTowards isogeny-based password-authenticated key establishmentIdentification protocols and signature schemes based on supersingular isogeny problemsDelay encryptionGroup key exchange protocols from supersingular isogeniesAn alternative approach for SIDH arithmeticIsogeny-based key compression without pairingsSimplified isogeny formulas on twisted Jacobi quartic curvesEliptic curves in post-quantum cryptographyEfficient Algorithms for Supersingular Isogeny Diffie-HellmanA Post-quantum Digital Signature Scheme Based on Supersingular Isogenies


Uses Software


Cites Work




This page was built for publication: Efficient Algorithms for Supersingular Isogeny Diffie-Hellman