New SIDH countermeasures for a more efficient key exchange
From MaRDI portal
Publication:6562585
DOI10.1007/978-981-99-8742-9_7zbMATH Open1542.94105MaRDI QIDQ6562585
Andrea Basso, Tako Boris Fouotsa
Publication date: 26 June 2024
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic hash functions from expander graphs
- Parallel collision search with cryptanalytic applications
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- On the cost of computing isogenies between supersingular elliptic curves
- Orienting supersingular isogeny graphs
- He gives C-sieves on the CSIDH
- Improved torsion-point attacks on SIDH variants
- A new adaptive attack on SIDH
- SQISign: compact post-quantum signatures from quaternions and isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The number of curves of genus two with elliptic differentials.
- The Arithmetic of Elliptic Curves
- Secure integration of asymmetric and symmetric encryption schemes
- On the Security of OSIDH
- Constructing elliptic curve isogenies in quantum subexponential time
- Efficient Compression of SIDH Public Keys
- Faster computation of isogenies of large prime degree
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Séta: Supersingular Encryption from Torsion Attacks
- Proving knowledge of isogenies: a survey
- SCALLOP: scaling the CSI-FiSh
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- An efficient key recovery attack on SIDH
- A direct key recovery attack on SIDH
- Breaking SIDH in polynomial time
- A new isogeny representation and applications to cryptography
- SIDH proof of knowledge
- Cryptanalysis of an oblivious PRF from supersingular isogenies
- Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
Related Items (2)
Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees ⋮ Isogeny problems with level structure
This page was built for publication: New SIDH countermeasures for a more efficient key exchange
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6562585)