Faster algorithms for isogeny problems using torsion point images
From MaRDI portal
Recommendations
- Improved torsion-point attacks on SIDH variants
- On the Security of Supersingular Isogeny Cryptosystems
- On the isogeny problem with torsion point information
- Identification protocols and signature schemes based on supersingular isogeny problems
- On the cost of computing isogenies between supersingular elliptic curves
Cited in
(48)- Breaking SIDH in polynomial time
- The supersingular isogeny problem in genus 2 and beyond
- On the security of OSIDH
- On the isogeny problem with torsion point information
- Identification protocols and signature schemes based on supersingular isogeny problems
- Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
- Improved torsion-point attacks on SIDH variants
- Orientations and the supersingular endomorphism ring problem
- On oriented supersingular elliptic curves
- Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
- How not to create an isogeny-based PAKE
- A key manipulation attack on some recent isogeny-based key agreement protocols
- On the cost of computing isogenies between supersingular elliptic curves
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Computational problems in supersingular elliptic curve isogenies
- On the hardness of the computational ring-LWR problem and its applications
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- On adaptive attacks against Jao-Urbanik's isogeny-based protocol
- Improved classical cryptanalysis of SIKE in practice
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- Explicit connections between supersingular isogeny graphs and Bruhat-Tits trees
- A new isogeny representation and applications to cryptography
- Towards isogeny-based password-authenticated key establishment
- Supersingular curves you can trust
- Two-round adaptively secure MPC from isogenies, LPN, or CDH
- Towards post-quantum key-updatable public-key encryption via supersingular isogenies
- A new adaptive attack on SIDH
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- Generating supersingular elliptic curves over \(\mathbb{F}_p\) with unknown endomorphism ring
- CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
- Delay encryption
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- Isogeny problems with level structure
- Round-optimal oblivious transfer and MPC from computational CSIDH
- Supersingular isogeny-based cryptography: a survey
- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
- The security of all private-key bits in isogeny-based schemes
- Séta: Supersingular Encryption from Torsion Attacks
- Oblivious pseudorandom functions from isogenies
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
- CSIDH: an efficient post-quantum commutative group action
- Eliptic curves in post-quantum cryptography
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
This page was built for publication: Faster algorithms for isogeny problems using torsion point images
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1703927)