On the statistical leak of the GGH13 multilinear map and some variants
From MaRDI portal
Publication:1633467
DOI10.1007/978-3-030-03326-2_16zbMath1446.94129OpenAlexW2896924988MaRDI QIDQ1633467
Publication date: 20 December 2018
Full work available at URL: https://ir.cwi.nl/pub/28260
Related Items (1)
Cites Work
- Arithmetic on abelian and Kummer varieties
- Fast cryptography in genus 2
- Legendre elliptic curves over finite fields
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- A fast Diffie-Hellman protocol in genus 2
- Computing isogenies between Montgomery curves using the action of \((0,0)\)
- qDSA: small and secure digital signatures with curve-based Diffie-Hellman key pairs
- Sequences of numbers generated by addition in formal groups and new primality and factorization tests
- Public-key cryptography -- PKC 2013. 16th international conference on practice and theory in public-key cryptography, Nara, Japan, February 26--March 1, 2013. Proceedings
- Descent via \((5, 5)\)-isogeny on Jacobians of genus 2 curves
- Jacobian coordinates on genus 2 curves
- Public-key cryptography -- PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26--28, 2014. Proceedings
- Advances in cryptology -- EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11--15, 2014. Proceedings
- Subvarieties of moduli spaces
- Arithmetic variety of moduli for genus two
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Linearly Homomorphic Structure-Preserving Signatures and Their Applications
- Succinct Non-Interactive Zero Knowledge Arguments from Span Programs and Linear Error-Correcting Codes
- Hyper-and-elliptic-curve cryptography
- Mathematics of Public Key Cryptography
- Kummer Strikes Back: New DH Speed Records
- Leveled Fully Homomorphic Signatures from Standard Lattices
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Descent via (3,3)-isogeny on Jacobians of genus 2 curves
- Factorization with genus 2 curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Computationally Sound Proofs
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- Constructing elliptic curve isogenies in quantum subexponential time
- Non-malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Fast genus 2 arithmetic based on Theta functions
- Automata, Languages and Programming
- On the Size of Pairing-Based Non-interactive Arguments
- Public Key Cryptography - PKC 2006
- Advances in Cryptology - ASIACRYPT 2003
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On the statistical leak of the GGH13 multilinear map and some variants