Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
From MaRDI portal
Publication:742016
DOI10.1515/jmc-2012-0015zbMath1372.94419OpenAlexW1987475429MaRDI QIDQ742016
Luca De Feo, Jérôme Plût, David D. W. Yao
Publication date: 17 September 2014
Published in: Journal of Mathematical Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1515/jmc-2012-0015
Cryptography (94A60) Number-theoretic algorithms; complexity (11Y16) Isogeny (14K02) Applications to coding theory and cryptography of arithmetic geometry (14G50)
Related Items
A key manipulation attack on some recent isogeny-based key agreement protocols ⋮ Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph ⋮ Fast computation of elliptic curve isogenies in characteristic two ⋮ SoK: how (not) to design and implement post-quantum cryptography ⋮ Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3 ⋮ Improved supersingularity testing of elliptic curves using Legendre form ⋮ Trapdoor DDH groups from pairings and isogenies ⋮ On isogeny graphs of supersingular elliptic curves over finite fields ⋮ On the hardness of the computational ring-LWR problem and its applications ⋮ On the statistical leak of the GGH13 multilinear map and some variants ⋮ Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ Faster isogenies for post-quantum cryptography: SIKE ⋮ Fully projective radical isogenies in constant-time ⋮ A new adaptive attack on SIDH ⋮ Safe-error attacks on SIKE and CSIDH ⋮ Radical Isogenies on Montgomery Curves ⋮ General linear group action on tensors: a candidate for post-quantum cryptography ⋮ Hilbert modular polynomials ⋮ The security of all private-key bits in isogeny-based schemes ⋮ SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH ⋮ Supersingular curves you can trust ⋮ Proving knowledge of isogenies: a survey ⋮ M-SIDH and MD-SIDH: countering SIDH attacks by masking information ⋮ An efficient key recovery attack on SIDH ⋮ Breaking SIDH in polynomial time ⋮ A lower bound on the length of signatures based on group actions and generic isogenies ⋮ Multiparty non-interactive key exchange and more from isogenies on elliptic curves ⋮ New techniques for SIDH-based NIKE ⋮ Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling ⋮ Accelerating the Delfs-Galbraith algorithm with fast subfield root detection ⋮ On the Security of Supersingular Isogeny Cryptosystems ⋮ SIDH proof of knowledge ⋮ Full quantum equivalence of group action DLog and CDH, and more ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Parallel isogeny path finding with limited memory ⋮ Post-quantum key exchange for the Internet and the open quantum safe project ⋮ Automorphisms of the supersingular isogeny graph ⋮ Efficiency of SIDH-based signatures (yes, SIDH) ⋮ Scalable ciphertext compression techniques for post-quantum KEMs and their applications ⋮ Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation ⋮ Cryptographic group actions and applications ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ Oblivious pseudorandom functions from isogenies ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ Computing supersingular isogenies on Kummer surfaces ⋮ On Fast Calculation of Addition Chains for Isogeny-Based Cryptography ⋮ Cyclic Isogenies for Abelian Varieties with Real Multiplication ⋮ On the cost of computing isogenies between supersingular elliptic curves ⋮ Ramanujan Graphs in Cryptography ⋮ Cycles in the Supersingular ℓ-Isogeny Graph and Corresponding Endomorphisms ⋮ How not to create an isogeny-based PAKE ⋮ Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors ⋮ Post-quantum static-static key agreement using multiple protocol instances ⋮ Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman ⋮ Efficient post-quantum undeniable signature on 64-bit ARM ⋮ Supersingular Isogeny-based Cryptography: A Survey ⋮ Computational problems in supersingular elliptic curve isogenies ⋮ Efficient Compression of SIDH Public Keys ⋮ Hash functions from superspecial genus-2 curves using Richelot isogenies ⋮ Towards isogeny-based password-authenticated key establishment ⋮ Algebraic approaches for solving isogeny problems of prime power degrees ⋮ A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE ⋮ Supersingular twisted Edwards curves over prime fields. II: Supersingular twisted Edwards curves with the \(j\)-invariant equal to \(66^3\) ⋮ Isogenies on twisted Hessian curves ⋮ Ramanujan Graphs for Post-Quantum Cryptography ⋮ Post-Quantum Constant-Round Group Key Exchange from Static Assumptions ⋮ Constructing cycles in isogeny graphs of supersingular elliptic curves ⋮ Bounds on short character sums and \(L\)-functions with characters to a powerful modulus ⋮ Identification protocols and signature schemes based on supersingular isogeny problems ⋮ Limonnitsa: making Limonnik-3 post-quantum ⋮ Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\) ⋮ Improved classical cryptanalysis of SIKE in practice ⋮ Delay encryption ⋮ Group key exchange protocols from supersingular isogenies ⋮ Isogeny-based key compression without pairings ⋮ Eliptic curves in post-quantum cryptography ⋮ Efficient Algorithms for Supersingular Isogeny Diffie-Hellman ⋮ Curves, Jacobians, and cryptography ⋮ Modular polynomials on Hilbert surfaces ⋮ Improved supersingularity testing of elliptic curves ⋮ Optimal strategies for CSIDH ⋮ Counting Richelot isogenies between superspecial abelian surfaces ⋮ A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies ⋮ Explicit Arithmetic on Abelian Varieties ⋮ High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications ⋮ Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications ⋮ Efficient Finite Field Multiplication for Isogeny Based Post Quantum Cryptography ⋮ \textsf{CSI-RAShi}: distributed key generation for CSIDH ⋮ Memory optimization techniques for computing discrete logarithms in compressed SIKE ⋮ Quantum security analysis of CSIDH