M-SIDH and MD-SIDH: countering SIDH attacks by masking information
From MaRDI portal
Publication:6083666
DOI10.1007/978-3-031-30589-4_10zbMath1528.94048OpenAlexW4365934480MaRDI QIDQ6083666
Tako Boris Fouotsa, Christophe Petit, Tomoki Moriya
Publication date: 8 December 2023
Published in: Advances in Cryptology – EUROCRYPT 2023 (Search for Journal in Brave)
Full work available at URL: https://dipot.ulb.ac.be/dspace/bitstream/2013/359804/3/MSIDH.pdf
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- Parallel collision search with cryptanalytic applications
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- Orienting supersingular isogeny graphs
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem
- Improved torsion-point attacks on SIDH variants
- A new adaptive attack on SIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- CSIDH on the Surface
- Identification protocols and signature schemes based on supersingular isogeny problems
- Cryptanalysis of an oblivious PRF from supersingular isogenies
This page was built for publication: M-SIDH and MD-SIDH: countering SIDH attacks by masking information