Efficiency of SIDH-based signatures (yes, SIDH)
From MaRDI portal
Publication:6193385
DOI10.1515/jmc-2023-0023MaRDI QIDQ6193385
Mattia Veroni, Federico Pintore, Wissam Ghantous
Publication date: 16 March 2024
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Mathematics of Public Key Cryptography
- The Arithmetic of Elliptic Curves
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- Identification protocols and signature schemes based on supersingular isogeny problems
- Supersingular curves you can trust
- A direct key recovery attack on SIDH
- Breaking SIDH in polynomial time
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- SIDH proof of knowledge
This page was built for publication: Efficiency of SIDH-based signatures (yes, SIDH)