CSIDH on the Surface

From MaRDI portal
Publication:5041217

DOI10.1007/978-3-030-44223-1_7zbMath1501.94035OpenAlexW2918362961MaRDI QIDQ5041217

Thomas Decru, Wouter Castryck

Publication date: 13 October 2022

Published in: Post-Quantum Cryptography (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/978-3-030-44223-1_7




Related Items (39)

(Short paper) Analysis of a strong fault attack on static/ephemeral CSIDHExplicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits TreesFully projective radical isogenies in constant-timeOptimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptographyOrientations and the supersingular endomorphism ring problemRadical Isogenies on Montgomery CurvesBreaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended versionSupersingular curves you can trustProving knowledge of isogenies: a surveyGeneric models for group actionsA flexible shared hardware accelerator for NIST-recommended algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA protectionM-SIDH and MD-SIDH: countering SIDH attacks by masking informationDisorientation faults in CSIDHBreaking SIDH in polynomial timeA lower bound on the length of signatures based on group actions and generic isogeniesNew algorithms for the Deuring correspondence. Towards practical and secure SQISign signaturesA lightweight identification protocol based on latticesAccelerating the Delfs-Galbraith algorithm with fast subfield root detectionHorizontal racewalking using radical isogeniesSIDH proof of knowledgeVerifying classic McEliece: examining the role of formal methods in post-quantum cryptography standardisationFull quantum equivalence of group action DLog and CDH, and moreWeak instances of class group action based cryptography via self-pairings\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key spaceDeCSIDH: delegating isogeny computations in the CSIDH settingAttack on SHealS and HealS: the second wave of GPSTPost-quantum signal key agreement from SIDHParallel isogeny path finding with limited memoryKey-recovery by side-channel information on the matrix-vector product in code-based cryptosystemsCalamari and Falafl: logarithmic (linkable) ring signatures from isogenies and latticesRadical isogeniesSiGamal: a supersingular isogeny-based PKE and its application to a PRFHow to construct CSIDH on Edwards curvesDelay encryptionCSURF-TWO: CSIDH for the ratio \((2:1)\)Optimal strategies for CSIDHBreaking the decisional Diffie-Hellman problem for class group actions using genus theoryOn the decisional Diffie-Hellman problem for class group actions on oriented elliptic curvesSimS: a simplification of SiGamal


Uses Software


Cites Work


This page was built for publication: CSIDH on the Surface