CSI-FiSh
From MaRDI portal
Cited in
(43)- On the security of OSIDH
- Trapdoor DDH groups from pairings and isogenies
- Orientations and the supersingular endomorphism ring problem
- Rational isogenies from irrational endomorphisms
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- SimS: a simplification of SiGamal
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- Approximate Voronoi cells for lattices, revisited
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Orienting supersingular isogeny graphs
- Radical isogenies on Montgomery curves
- Post-quantum key-blinding for authentication in anonymity networks
- Post-quantum adaptor signature for privacy-preserving off-chain payments
- An isogeny-based ID protocol using structured public keys
- McEliece
- HMQV
- NAXOS
- CADO-NFS
- SWIFFT
- SIDH
- SPHINCS
- AVIsogenies
- Falcon
- CSIDH
- Elligator
- Picnic
- BLAZE
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms
- Hawk
- SeaSign
- BICYCL
- Silver
- SIKE
- libOTe
- G6K
- FROST
- CSIDH
- DVNIZK
- MuSig2
This page was built for software: CSI-FiSh