Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies

From MaRDI portal
Publication:3102781

DOI10.1007/978-3-642-25405-5_2zbMath1290.94094OpenAlexW43667552MaRDI QIDQ3102781

David D. W. Yao, Luca De Feo

Publication date: 25 November 2011

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-642-25405-5_2




Related Items (only showing first 100 items - show all)

Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graphComputational quantum key distribution (CQKD) on decentralized ledger and blockchainSoK: how (not) to design and implement post-quantum cryptographyGroup Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny CryptosystemsThe Supersingular Isogeny Problem in Genus 2 and BeyondThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3Improved torsion-point attacks on SIDH variantsOn division polynomial PIT and supersingularityAn efficient authenticated key exchange from random self-reducibility on CSIDHTowards post-quantum security for signal's X3DH handshakePractical isogeny-based key-exchange with optimal tightnessExplicit construction of the square-root Vélu's formula on Edwards curvesExplicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits TreesOn Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based ProtocolOn isogeny graphs of supersingular elliptic curves over finite fieldsQuantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsOn the statistical leak of the GGH13 multilinear map and some variantsFast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGAResistance of isogeny-based cryptographic implementations to a fault attackAn isogeny-based ID protocol using structured public keysExtending the signed non-zero bit and sign-aligned columns methods to general bases for use in cryptographyFaster isogenies for post-quantum cryptography: SIKEFully projective radical isogenies in constant-timeA new adaptive attack on SIDHAn efficient post-quantum KEM from CSIDHOptimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptographyOrientations and the supersingular endomorphism ring problemPractical post-quantum signature schemes from isomorphism problems of trilinear formsOn the Isogeny Problem with Torsion Point InformationRadical Isogenies on Montgomery CurvesAlgebraic generalization of Diffie-Hellman key exchangeIsogeny Computation on Twisted Jacobi IntersectionsCryptanalysis of the CLR-cryptosystemThe security of all private-key bits in isogeny-based schemesSéta: Supersingular Encryption from Torsion AttacksSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHNew techniques for SIDH-based NIKEOn the Security of Supersingular Isogeny CryptosystemsIsogeny formulas for Jacobi intersection and twisted Hessian curvesAn attack on a non-interactive key exchange from code equivalence\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key spaceFinding collisions in a quantum world: quantum black-box separation of collision-resistance and one-waynessSQISign: compact post-quantum signatures from quaternions and isogeniesCryptographic group actions and applicationsB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionRadical isogeniesSiGamal: a supersingular isogeny-based PKE and its application to a PRFFaster isogeny computation on twisted Hessian curvesTowards practical key exchange from ordinary isogeny graphsCSIDH: an efficient post-quantum commutative group actionComputing supersingular isogenies on Kummer surfacesOn Fast Calculation of Addition Chains for Isogeny-Based CryptographyConstructing Isogenies on Extended Jacobi Quartic CurvesAn Interactive Tool to Explore and Improve the Ply Number of DrawingsOn the cost of computing isogenies between supersingular elliptic curvesSIKE Round 2 Speed Record on ARM Cortex-M4Optimized Algorithms and Architectures for Montgomery Multiplication for Post-quantum CryptographyHow not to create an isogeny-based PAKESecure two-party computation in a quantum worldDecomposed Richelot isogenies of Jacobian varieties of curves of genus 3On the supersingular GPST attackSide-channel attacks on quantum-resistant supersingular isogeny Diffie-HellmanEfficient post-quantum undeniable signature on 64-bit ARMSupersingular Isogeny-based Cryptography: A SurveyComputational problems in supersingular elliptic curve isogeniesOn oriented supersingular elliptic curvesEfficient Compression of SIDH Public KeysHash functions from superspecial genus-2 curves using Richelot isogeniesOrienting supersingular isogeny graphsTowards isogeny-based password-authenticated key establishmentAlgebraic approaches for solving isogeny problems of prime power degreesA framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKEAnalogues of Vélu’s formulas for isogenies on alternate models of elliptic curvesCryptanalysis of the extension field cancellation cryptosystemComputing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)Neighborhood of the supersingular elliptic curve isogeny graph at \(j = 0\) and 1728Translating the discrete logarithm problem on Jacobians of genus 3 hyperelliptic curves with \((\ell ,\ell ,\ell)\)-isogeniesConstructing cycles in isogeny graphs of supersingular elliptic curvesIdentification protocols and signature schemes based on supersingular isogeny problemsLossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Threshold schemes from isogeny assumptionsImproved classical cryptanalysis of SIKE in practiceCompact, efficient and UC-secure isogeny-based oblivious transferOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsSieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problemCSURF-TWO: CSIDH for the ratio \((2:1)\)An alternative approach for SIDH arithmeticSimplified isogeny formulas on twisted Jacobi quartic curvesEfficient Algorithms for Supersingular Isogeny Diffie-HellmanImplementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondenceIndifferentiability for public key cryptosystemsComputing newforms using supersingular isogeny graphsOn the decisional Diffie-Hellman problem for class group actions on oriented elliptic curvesHigh-degree Compression Functions on Alternative Models of Elliptic Curves and their ApplicationsDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applicationsSimS: a simplification of SiGamalHe gives C-sieves on the CSIDHRational isogenies from irrational endomorphismsSupersingular curves you can trust


Uses Software


Cites Work


This page was built for publication: Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies