Faster algorithms for isogeny problems using torsion point images

From MaRDI portal
Publication:1703927

DOI10.1007/978-3-319-70697-9_12zbMath1409.94898OpenAlexW2770869760MaRDI QIDQ1703927

Christophe Petit

Publication date: 8 March 2018

Full work available at URL: http://pure-oai.bham.ac.uk/ws/files/42837397/FasterAlgorithms.pdf




Related Items (35)

Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny CryptosystemsThe Supersingular Isogeny Problem in Genus 2 and BeyondImproved torsion-point attacks on SIDH variantsExplicit Connections Between Supersingular Isogeny Graphs and Bruhat–Tits TreesOn the hardness of the computational ring-LWR problem and its applicationsA new adaptive attack on SIDHOrientations and the supersingular endomorphism ring problemOn the Security of OSIDHThe security of all private-key bits in isogeny-based schemesSéta: Supersingular Encryption from Torsion AttacksSHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDHSupersingular curves you can trustRound-optimal oblivious transfer and MPC from computational CSIDHM-SIDH and MD-SIDH: countering SIDH attacks by masking informationAn efficient key recovery attack on SIDHA direct key recovery attack on SIDHBreaking SIDH in polynomial timeA new isogeny representation and applications to cryptographyTwo-round adaptively secure MPC from isogenies, LPN, or CDHB-SIDH: supersingular isogeny Diffie-Hellman using twisted torsionOblivious pseudorandom functions from isogeniesSiGamal: a supersingular isogeny-based PKE and its application to a PRFCSIDH: an efficient post-quantum commutative group actionOn the cost of computing isogenies between supersingular elliptic curvesHow not to create an isogeny-based PAKESupersingular Isogeny-based Cryptography: A SurveyComputational problems in supersingular elliptic curve isogeniesOn oriented supersingular elliptic curvesTowards isogeny-based password-authenticated key establishmentIdentification protocols and signature schemes based on supersingular isogeny problemsImproved classical cryptanalysis of SIKE in practiceOne-way functions and malleability oracles: hidden shift attacks on isogeny-based protocolsDelay encryptionEliptic curves in post-quantum cryptographyDelegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications






This page was built for publication: Faster algorithms for isogeny problems using torsion point images