Pages that link to "Item:Q3102781"
From MaRDI portal
The following pages link to Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies (Q3102781):
Displayed 26 items.
- Proving knowledge of isogenies: a survey (Q6063129) (← links)
- How to construct CSIDH on Edwards curves (Q6063264) (← links)
- Homomorphic polynomial public key encapsulation over two hidden rings for quantum-safe key encapsulation (Q6073976) (← links)
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information (Q6083666) (← links)
- An efficient key recovery attack on SIDH (Q6083671) (← links)
- A direct key recovery attack on SIDH (Q6083674) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- A lower bound on the length of signatures based on group actions and generic isogenies (Q6083676) (← links)
- A lightweight identification protocol based on lattices (Q6091129) (← links)
- Password-authenticated key exchange from group actions (Q6104356) (← links)
- Protecting the most significant bits in scalar multiplication algorithms (Q6112010) (← links)
- Adventures in Supersingularland (Q6112161) (← links)
- A new isogeny representation and applications to cryptography (Q6132404) (← links)
- SIDH proof of knowledge (Q6132414) (← links)
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures (Q6145533) (← links)
- Weak instances of class group action based cryptography via self-pairings (Q6145971) (← links)
- Cryptanalysis of an oblivious PRF from supersingular isogenies (Q6157490) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- DeCSIDH: delegating isogeny computations in the CSIDH setting (Q6157595) (← links)
- Attack on SHealS and HealS: the second wave of GPST (Q6166995) (← links)
- Post-quantum signal key agreement from SIDH (Q6166996) (← links)
- Post-quantum asynchronous deniable key exchange and the signal handshake (Q6169026) (← links)
- Post-quantum anonymous one-sided authenticated key exchange without random oracles (Q6169027) (← links)
- Parallel isogeny path finding with limited memory (Q6169469) (← links)
- Efficient computation of \((3^n,3^n)\)-isogenies (Q6186336) (← links)
- On the key generation in $\mathbf{SQISign}$ (Q6196948) (← links)