Pages that link to "Item:Q2958115"
From MaRDI portal
The following pages link to On the Security of Supersingular Isogeny Cryptosystems (Q2958115):
Displaying 44 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Post-quantum static-static key agreement using multiple protocol instances (Q1746952) (← links)
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman (Q1746954) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- On oriented supersingular elliptic curves (Q1995212) (← links)
- Towards isogeny-based password-authenticated key establishment (Q2027265) (← links)
- Algebraic approaches for solving isogeny problems of prime power degrees (Q2027266) (← links)
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols (Q2056686) (← links)
- CSURF-TWO: CSIDH for the ratio \((2:1)\) (Q2057141) (← links)
- Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence (Q2080033) (← links)
- Indifferentiability for public key cryptosystems (Q2096477) (← links)
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves (Q2100582) (← links)
- SimS: a simplification of SiGamal (Q2118549) (← links)
- Rational isogenies from irrational endomorphisms (Q2119023) (← links)
- Improved torsion-point attacks on SIDH variants (Q2129006) (← links)
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 (Q2145305) (← links)
- Resistance of isogeny-based cryptographic implementations to a fault attack (Q2145308) (← links)
- Faster isogenies for post-quantum cryptography: SIKE (Q2152149) (← links)
- A new adaptive attack on SIDH (Q2152168) (← links)
- Safe-error attacks on SIKE and CSIDH (Q2154061) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- Orientations and the supersingular endomorphism ring problem (Q2170093) (← links)
- The security of all private-key bits in isogeny-based schemes (Q2185742) (← links)
- New techniques for SIDH-based NIKE (Q2191209) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- On the supersingular GPST attack (Q2239798) (← links)
- Eliptic curves in post-quantum cryptography (Q2315804) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- Limonnitsa: making Limonnik-3 post-quantum (Q3383104) (← links)
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems (Q5040377) (← links)
- The Supersingular Isogeny Problem in Genus 2 and Beyond (Q5041219) (← links)
- On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol (Q5048970) (← links)
- On the Isogeny Problem with Torsion Point Information (Q5087255) (← links)
- ISOGENIES OF ABELIAN VARIETIES IN CRYPTOGRAPHY (Q5110151) (← links)
- Supersingular Isogeny-based Cryptography: A Survey (Q5158416) (← links)
- Efficient Compression of SIDH Public Keys (Q5738894) (← links)
- Identification protocols and signature schemes based on supersingular isogeny problems (Q5919490) (← links)
- Proving knowledge of isogenies: a survey (Q6063129) (← links)