Faster algorithms for isogeny problems using torsion point images
From MaRDI portal
Publication:1703927
DOI10.1007/978-3-319-70697-9_12zbMath1409.94898OpenAlexW2770869760MaRDI QIDQ1703927
Publication date: 8 March 2018
Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/42837397/FasterAlgorithms.pdf
Related Items (35)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ The Supersingular Isogeny Problem in Genus 2 and Beyond ⋮ Improved torsion-point attacks on SIDH variants ⋮ Explicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits Trees ⋮ On the hardness of the computational ring-LWR problem and its applications ⋮ A new adaptive attack on SIDH ⋮ Orientations and the supersingular endomorphism ring problem ⋮ On the Security of OSIDH ⋮ The security of all private-key bits in isogeny-based schemes ⋮ Séta: Supersingular Encryption from Torsion Attacks ⋮ SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH ⋮ Supersingular curves you can trust ⋮ Round-optimal oblivious transfer and MPC from computational CSIDH ⋮ M-SIDH and MD-SIDH: countering SIDH attacks by masking information ⋮ An efficient key recovery attack on SIDH ⋮ A direct key recovery attack on SIDH ⋮ Breaking SIDH in polynomial time ⋮ A new isogeny representation and applications to cryptography ⋮ Two-round adaptively secure MPC from isogenies, LPN, or CDH ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ Oblivious pseudorandom functions from isogenies ⋮ SiGamal: a supersingular isogeny-based PKE and its application to a PRF ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ On the cost of computing isogenies between supersingular elliptic curves ⋮ How not to create an isogeny-based PAKE ⋮ Supersingular Isogeny-based Cryptography: A Survey ⋮ Computational problems in supersingular elliptic curve isogenies ⋮ On oriented supersingular elliptic curves ⋮ Towards isogeny-based password-authenticated key establishment ⋮ Identification protocols and signature schemes based on supersingular isogeny problems ⋮ Improved classical cryptanalysis of SIKE in practice ⋮ One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols ⋮ Delay encryption ⋮ Eliptic curves in post-quantum cryptography ⋮ Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
This page was built for publication: Faster algorithms for isogeny problems using torsion point images