Revisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challenge
From MaRDI portal
Publication:6619846
DOI10.1007/978-3-031-58411-4_10zbMATH Open1547.94423MaRDI QIDQ6619846
Giuseppe Vitto, Aleksei Udovenko
Publication date: 16 October 2024
Cryptography (94A60) Isogeny (14K02) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Cites Work
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Nonsingular plane cubic curves over finite fields
- Parallel collision search with cryptanalytic applications
- Computing isogenies between Montgomery curves using the action of \((0,0)\)
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- On the cost of computing isogenies between supersingular elliptic curves
- Improved classical cryptanalysis of SIKE in practice
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Endomorphisms of Abelian varieties over finite fields
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The Arithmetic of Elliptic Curves
- Constructing Isogenies between Elliptic Curves Over Finite Fields
This page was built for publication: Revisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challenge
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6619846)