Séta: Supersingular Encryption from Torsion Attacks
From MaRDI portal
Publication:6041286
DOI10.1007/978-3-030-92068-5_9zbMath1514.94073OpenAlexW4200380216MaRDI QIDQ6041286
Javier Silva, Péter Kutas, Luca De Feo, Tako Boris Fouotsa, Cyprien Delpech De Saint Guilhem, Christophe Petit, Benjamin Wesolowski, Antonin Leroux
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_9
Related Items (11)
Orientations and the supersingular endomorphism ring problem ⋮ Supersingular curves you can trust ⋮ SCALLOP: scaling the CSI-FiSh ⋮ An efficient key recovery attack on SIDH ⋮ A direct key recovery attack on SIDH ⋮ Breaking SIDH in polynomial time ⋮ New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures ⋮ Orienteering with one endomorphism ⋮ A new isogeny representation and applications to cryptography ⋮ On the feasibility of computing constructive Deuring correspondence ⋮ On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
Cites Work
- Unnamed Item
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Supersingular j-invariants as singular moduli mod p
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Cryptographic hash functions from expander graphs
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- Orienting supersingular isogeny graphs
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- SQISign: compact post-quantum signatures from quaternions and isogenies
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- On the quaternion -isogeny path problem
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- NON-BACKTRACKING RANDOM WALKS MIX FASTER
- The Uber-Assumption Family
- The Arithmetic of Elliptic Curves
- Identifying the Matrix Ring: Algorithms for Quaternion Algebras and Quadratic Forms
- Supersingular curves with small noninteger endomorphisms
- Faster computation of isogenies of large prime degree
- Identification protocols and signature schemes based on supersingular isogeny problems
This page was built for publication: Séta: Supersingular Encryption from Torsion Attacks