Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
From MaRDI portal
Publication:6595808
DOI10.1007/978-981-99-8727-6_4zbMath1546.94061MaRDI QIDQ6595808
Mingjie Chen, Christophe Petit, Antonin Leroux, Muhammad Imran, Gábor Ivanyos, Péter Kutas
Publication date: 30 August 2024
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Faster algorithms for isogeny problems using torsion point images
- CSIDH: an efficient post-quantum commutative group action
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Improved torsion-point attacks on SIDH variants
- Computing the structure of finite algebras
- SQISign: compact post-quantum signatures from quaternions and isogenies
- On the quaternion -isogeny path problem
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Finding conjugate stabilizer subgroups in PSL(2; q) and related groups
- Full Cryptanalysis of LPS and Morgenstern Hash Functions
- The Arithmetic of Elliptic Curves
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Abelian varieties over finite fields
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- On quantum algorithms for noncommutative hidden subgroups
- SCALLOP: scaling the CSI-FiSh
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- An efficient key recovery attack on SIDH
- A new isogeny representation and applications to cryptography
Related Items (2)
This page was built for publication: Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH