Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
From MaRDI portal
(Redirected from Publication:1746954)
Recommendations
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- On the Security of Supersingular Isogeny Cryptosystems
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cites work
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- An Analysis of Goubin’s Refined Power Analysis Attack
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic hash functions from expander graphs
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Efficient compression of SIDH public keys
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Fault attack on supersingular isogeny cryptosystems
- Identification protocols and signature schemes based on supersingular isogeny problems
- Isogeny-based quantum-resistant undeniable signatures
- Loop-abort faults on supersingular isogeny cryptosystems
- On fast calculation of addition chains for isogeny-based cryptography
- On the Security of Supersingular Isogeny Cryptosystems
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Twisted Edwards Curves
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
Cited in
(13)- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Faster isogenies for post-quantum cryptography: SIKE
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- On the supersingular GPST attack
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Safe-error attacks on SIKE and CSIDH
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Loop-abort faults on supersingular isogeny cryptosystems
- Resistance of isogeny-based cryptographic implementations to a fault attack
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- Exploring SIDH-based signature parameters
This page was built for publication: Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746954)