Exploring SIDH-based signature parameters
From MaRDI portal
Publication:6547992
DOI10.1007/978-3-031-54770-6_17MaRDI QIDQ6547992
Andrea Basso, Abel Laval, Laurane Marco, Gustave Tchoffo Saah, Mingjie Chen, Péter Kutas, Tako Boris Fouotsa
Publication date: 31 May 2024
Cryptography (94A60) Elliptic curves (14H52) Isogeny (14K02) Authentication, digital signatures and secret sharing (94A62) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- Parallel collision search with cryptanalytic applications
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- On the cost of computing isogenies between supersingular elliptic curves
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Rational isogenies from irrational endomorphisms
- Improved torsion-point attacks on SIDH variants
- A new adaptive attack on SIDH
- Orientations and the supersingular endomorphism ring problem
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Verifiable delay functions from supersingular isogenies and pairings
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Cryptographic group actions and applications
- Oblivious pseudorandom functions from isogenies
- On the quaternion -isogeny path problem
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- On the Isogeny Problem with Torsion Point Information
- Faster computation of isogenies of large prime degree
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs
- Identification protocols and signature schemes based on supersingular isogeny problems
- Identification protocols and signature schemes based on supersingular isogeny problems
- Séta: Supersingular Encryption from Torsion Attacks
- Supersingular curves you can trust
- Proving knowledge of isogenies: a survey
- SCALLOP: scaling the CSI-FiSh
- Round-optimal oblivious transfer and MPC from computational CSIDH
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- An efficient key recovery attack on SIDH
- A direct key recovery attack on SIDH
- Breaking SIDH in polynomial time
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- SIDH proof of knowledge
- Cryptanalysis of an oblivious PRF from supersingular isogenies
This page was built for publication: Exploring SIDH-based signature parameters
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547992)