CSIDH: an efficient post-quantum commutative group action
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3889661 (Why is no real title available?)
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 503244 (Why is no real title available?)
- scientific article; zbMATH DE number 6164023 (Why is no real title available?)
- scientific article; zbMATH DE number 3353398 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A $p$-adic algorithm to compute the Hilbert class polynomial
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- A modular analysis of the Fujisaki-Okamoto transformation
- A note on the security of CSIDH
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- Abelian varieties over finite fields
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Binary quadratic forms. An algorithmic approach
- Computational problems in supersingular elliptic curve isogenies
- Computing endomorphism rings of elliptic curves under the GRH
- Computing isogenies between Montgomery curves using the action of \((0,0)\)
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Cryptographic hash functions from expander graphs
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Efficient CM-constructions of elliptic curves over finite fields
- Endomorphisms of Abelian varieties over finite fields
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Factoring polynomials with rational coefficients
- Fast quantum algorithms for computing the unit group and class group of a number field
- Faster algorithms for isogeny problems using torsion point images
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identification protocols and signature schemes based on supersingular isogeny problems
- Identifying supersingular elliptic curves
- Isogeny volcanoes
- Mathematics of public key cryptography.
- New directions in cryptography
- Non-interactive key exchange
- Nonsingular plane cubic curves over finite fields
- On the Security of Supersingular Isogeny Cryptosystems
- On the cost of computing isogenies between supersingular elliptic curves
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Quantum proofs of knowledge
- Quantum security analysis of CSIDH
- Ramanujan graphs and Hecke operators
- Secure integration of asymmetric and symmetric encryption schemes
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- The Arithmetic of Elliptic Curves
- The Congruence (p - 1/2)! ≡± 1 (mod p)
- The LLL algorithm. Survey and applications
- Towards practical key exchange from ordinary isogeny graphs
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- TweetNaCl: A Crypto Library in 100 Tweets
- Zur Theorie der abstrakten elliptischen Funktionenkörper III. Die Struktur des Meromorphismenrings. Die Riemannsche Vermutung.
Cited in
(only showing first 100 items - show all)- Quantum lattice enumeration and tweaking discrete pruning
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
- Explicit connections between supersingular isogeny graphs and Bruhat-Tits trees
- Séta: Supersingular Encryption from Torsion Attacks
- Orientations and the supersingular endomorphism ring problem
- He gives C-sieves on the CSIDH
- Oblivious pseudorandom functions from isogenies
- Quantum security analysis of CSIDH
- An Interactive Tool to Explore and Improve the Ply Number of Drawings
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Improved supersingularity testing of elliptic curves using Legendre form
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- Trapdoor DDH groups from pairings and isogenies
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- SimS: a simplification of SiGamal
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended version
- Optimal strategies for CSIDH
- The supersingular isogeny problem in genus 2 and beyond
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- On oriented supersingular elliptic curves
- On collisions related to an ideal class of order 3 in CSIDH
- Uniform encodings to elliptic curves and indistinguishable point representation
- Threshold schemes from isogeny assumptions
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Delay encryption
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- CSURF-TWO: CSIDH for the ratio \((2:1)\)
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- Algebraic approaches for solving isogeny problems of prime power degrees
- On the security of OSIDH
- SoK: how (not) to design and implement post-quantum cryptography
- Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Rational isogenies from irrational endomorphisms
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- Cryptographic group actions and applications
- Orienting supersingular isogeny graphs
- Cryptanalysis of an oblivious PRF from supersingular isogenies
- Efficient compression of SIDH public keys
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Faster isogenies for post-quantum cryptography: SIKE
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New techniques for SIDH-based NIKE
- Hilbert modular polynomials
- Counting Richelot isogenies between superspecial abelian surfaces
- Adventures in Supersingularland
- SQISign: compact post-quantum signatures from quaternions and isogenies
- Two remarks on the vectorization problem
- A fusion algorithm for solving the hidden shift problem in finite abelian groups
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Radical isogenies
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
- How not to create an isogeny-based PAKE
- Simplified isogeny formulas on twisted Jacobi quartic curves
- CSIDH on the surface
- Supersingular curves with small noninteger endomorphisms
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
- Isogeny formulas for Jacobi intersection and twisted Hessian curves
- Towards practical key exchange from ordinary isogeny graphs
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Sashimi: cutting up CSI-FiSh secret keys to produce an actively secure distributed signing protocol
- Improved torsion-point attacks on SIDH variants
- From the hardness of detecting superpositions to cryptography: quantum public key encryption and commitments
- Improvement of the square-root Vélu's formulas for isogeny-based cryptography
- (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH
- Orientations and cycles in supersingular isogeny graphs
- Cryptographic primitives with hinting property
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- Effective pairings in isogeny-based cryptography
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Horizontal racewalking using radical isogenies
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
- Finding orientations of supersingular elliptic curves and quaternion orders
- Post-quantum key-blinding for authentication in anonymity networks
- Post-quantum adaptor signature for privacy-preserving off-chain payments
- An isogeny-based ID protocol using structured public keys
- High-degree compression functions on alternative models of elliptic curves and their applications
- An efficient strong asymmetric PAKE compiler instantiable from group actions
- Protecting the most significant bits in scalar multiplication algorithms
- Lattice-based authenticated key exchange with tight security
- Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms
- Special properties of the point addition law for non-cyclic Edwards curves
- On the multi-user security of LWE-based NIKE
- Round-robin is optimal: lower bounds for group action based protocols
- Multiradical isogenies
- Group action key encapsulation and non-interactive key exchange in the QROM
- Robustly reusable fuzzy extractor from isogeny
- Traceable ring signatures from group actions: logarithmic, flexible, and quantum resistant
- Attack on SHealS and HealS: the second wave of GPST
- Post-quantum signal key agreement from SIDH
- Generating supersingular elliptic curves over \(\mathbb{F}_p\) with unknown endomorphism ring
- Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\)
- A direct key recovery attack on SIDH
This page was built for publication: CSIDH: an efficient post-quantum commutative group action
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1710683)