How not to create an isogeny-based PAKE
From MaRDI portal
Recommendations
- Password-based authenticated key exchange from standard isogeny assumptions
- Towards isogeny-based password-authenticated key establishment
- Password-authenticated key exchange from group actions
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Universal composable password authenticated key exchange for the post-quantum world
Cites work
- scientific article; zbMATH DE number 5009198 (Why is no real title available?)
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A faster way to the CSIDH
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Authenticated key exchange secure against dictionary attacks
- CSIDH: an efficient post-quantum commutative group action
- Constructing canonical strategies for parallel implementation of isogeny based cryptography
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic hash functions from expander graphs
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Efficient compression of SIDH public keys
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Faster algorithms for isogeny problems using torsion point images
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Hash proof systems over lattices revisited
- Identification protocols and signature schemes based on supersingular isogeny problems
- On lions and elligators: an efficient constant-time implementation of CSIDH
- On the Security of Supersingular Isogeny Cryptosystems
- On the cost of computing isogenies between supersingular elliptic curves
- Password-based authenticated key exchange from standard isogeny assumptions
- Provably secure password authenticated key exchange based on RLWE for the post-quantum world
- Ramanujan graphs in cryptography
- Rational isogenies from irrational endomorphisms
- Smooth projective hashing and password-based authenticated key exchange from lattices
- Stronger and faster side-channel protections for CSIDH
- Supersingular curves with small noninteger endomorphisms
- Towards isogeny-based password-authenticated key establishment
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Two-round PAKE from approximate SPH and instantiations from lattices
- Two-round PAKE protocol over lattices without NIZK
Cited in
(6)- Faster isogenies for post-quantum cryptography: SIKE
- Password-authenticated key exchange from group actions
- CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
- Universal composable password authenticated key exchange for the post-quantum world
- Don't ever do that! Long-term duties in \(PD_{e}L\)
- Compact password authenticated key exchange from group actions
This page was built for publication: How not to create an isogeny-based PAKE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229270)