A polynomial time attack on instances of M-SIDH and FESTA
From MaRDI portal
Publication:6595919
DOI10.1007/978-981-99-8739-9_5zbMATH Open1546.94059MaRDI QIDQ6595919
Wouter Castryck, Frederik Vercauteren
Publication date: 30 August 2024
Cryptography (94A60) Elliptic curves over global fields (11G05) Elliptic curves (14H52) Curves over finite and local fields (11G20) Isogeny (14K02) Applications to coding theory and cryptography of arithmetic geometry (14G50) Elliptic curves over local fields (11G07) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Cryptographic hash functions from expander graphs
- CSIDH: an efficient post-quantum commutative group action
- On oriented supersingular elliptic curves
- Orienting supersingular isogeny graphs
- Improved torsion-point attacks on SIDH variants
- Stronger and faster side-channel protections for CSIDH
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Faster Key Compression for Isogeny-Based Cryptosystems
- Supersingular curves with small noninteger endomorphisms
- Supersingular curves you can trust
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- An efficient key recovery attack on SIDH
- A direct key recovery attack on SIDH
- Breaking SIDH in polynomial time
- Weak instances of class group action based cryptography via self-pairings
Related Items (5)
Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees ⋮ \textsf{FESTA}: fast encryption from supersingular torsion attacks ⋮ SCALLOP-HD: group action from 2-dimensional isogenies ⋮ Isogeny problems with level structure ⋮ QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras
This page was built for publication: A polynomial time attack on instances of M-SIDH and FESTA
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6595919)