Pages that link to "Item:Q2835601"
From MaRDI portal
The following pages link to Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601):
Displaying 40 items.
- Improved supersingularity testing of elliptic curves using Legendre form (Q831974) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- On the statistical leak of the GGH13 multilinear map and some variants (Q1633467) (← links)
- Post-quantum key exchange for the Internet and the open quantum safe project (Q1698609) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Computing supersingular isogenies on Kummer surfaces (Q1710684) (← links)
- On the cost of computing isogenies between supersingular elliptic curves (Q1726684) (← links)
- Post-quantum static-static key agreement using multiple protocol instances (Q1746952) (← links)
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman (Q1746954) (← links)
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption (Q1746967) (← links)
- Efficient post-quantum undeniable signature on 64-bit ARM (Q1746974) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Delay encryption (Q2056688) (← links)
- Group key exchange protocols from supersingular isogenies (Q2057142) (← links)
- An alternative approach for SIDH arithmetic (Q2061911) (← links)
- Isogeny-based key compression without pairings (Q2061915) (← links)
- Simplified isogeny formulas on twisted Jacobi quartic curves (Q2066406) (← links)
- A key manipulation attack on some recent isogeny-based key agreement protocols (Q2119312) (← links)
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3 (Q2129004) (← links)
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 (Q2145305) (← links)
- Resistance of isogeny-based cryptographic implementations to a fault attack (Q2145308) (← links)
- Faster isogenies for post-quantum cryptography: SIKE (Q2152149) (← links)
- A new adaptive attack on SIDH (Q2152168) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography (Q2169440) (← links)
- The security of all private-key bits in isogeny-based schemes (Q2185742) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- Eliptic curves in post-quantum cryptography (Q2315804) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman (Q2835601) (← links)
- On the Security of Supersingular Isogeny Cryptosystems (Q2958115) (← links)
- On Fast Calculation of Addition Chains for Isogeny-Based Cryptography (Q2980864) (← links)
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA (Q3179485) (← links)
- SIKE Round 2 Speed Record on ARM Cortex-M4 (Q3297612) (← links)
- Many a Mickle Makes a Muckle: A Framework for Provably Quantum-Secure Hybrid Key Exchange (Q5041238) (← links)
- Efficient Compression of SIDH Public Keys (Q5738894) (← links)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies (Q5854432) (← links)
- Identification protocols and signature schemes based on supersingular isogeny problems (Q5919490) (← links)
- Efficiency of SIDH-based signatures (yes, SIDH) (Q6193385) (← links)