Pages that link to "Item:Q1710683"
From MaRDI portal
The following pages link to CSIDH: an efficient post-quantum commutative group action (Q1710683):
Displayed 50 items.
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293) (← links)
- Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\) (Q2302571) (← links)
- Eliptic curves in post-quantum cryptography (Q2315804) (← links)
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended version (Q2675346) (← links)
- An attack on a non-interactive key exchange from code equivalence (Q2685412) (← links)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space (Q2685697) (← links)
- Special properties of the point addition law for non-cyclic Edwards curves (Q2686643) (← links)
- SQISign: compact post-quantum signatures from quaternions and isogenies (Q2692337) (← links)
- Scalable ciphertext compression techniques for post-quantum KEMs and their applications (Q2692345) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices (Q2692392) (← links)
- Radical isogenies (Q2692393) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF (Q2692395) (← links)
- Faster isogeny computation on twisted Hessian curves (Q2698085) (← links)
- An Interactive Tool to Explore and Improve the Ply Number of Drawings (Q4625099) (← links)
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions (Q4964367) (← links)
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems (Q5040377) (← links)
- CSIDH on the Surface (Q5041217) (← links)
- The Supersingular Isogeny Problem in Genus 2 and Beyond (Q5041219) (← links)
- Sashimi: Cutting up CSI-FiSh Secret Keys to Produce an Actively Secure Distributed Signing Protocol (Q5041220) (← links)
- Explicit construction of the square-root Vélu's formula on Edwards curves (Q5047146) (← links)
- Explicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits Trees (Q5048626) (← links)
- On the Security of OSIDH (Q5087250) (← links)
- Radical Isogenies on Montgomery Curves (Q5087267) (← links)
- Isogeny Computation on Twisted Jacobi Intersections (Q5095921) (← links)
- Supersingular curves with small noninteger endomorphisms (Q5853786) (← links)
- Counting Richelot isogenies between superspecial abelian surfaces (Q5853803) (← links)
- High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications (Q5862340) (← links)
- Multiradical isogenies (Q5880203) (← links)
- Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph (Q5880205) (← links)
- Séta: Supersingular Encryption from Torsion Attacks (Q6041286) (← links)
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH (Q6041287) (← links)
- Group signatures and more from isogenies and lattices: generic, simple, and efficient (Q6041582) (← links)
- Supersingular curves you can trust (Q6061368) (← links)
- Proving knowledge of isogenies: a survey (Q6063129) (← links)
- How to construct CSIDH on Edwards curves (Q6063264) (← links)
- SCALLOP: scaling the CSI-FiSh (Q6070766) (← links)
- Round-optimal oblivious transfer and MPC from computational CSIDH (Q6070767) (← links)
- Generic models for group actions (Q6070770) (← links)
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information (Q6083666) (← links)
- Disorientation faults in CSIDH (Q6083667) (← links)
- An efficient key recovery attack on SIDH (Q6083671) (← links)
- A direct key recovery attack on SIDH (Q6083674) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- Orienteering with one endomorphism (Q6093270) (← links)
- Password-authenticated key exchange from group actions (Q6104356) (← links)
- Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling (Q6108793) (← links)
- Protecting the most significant bits in scalar multiplication algorithms (Q6112010) (← links)