Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
From MaRDI portal
Publication:1746954
DOI10.1007/978-3-319-72565-9_4zbMATH Open1384.94076OpenAlexW2775917193MaRDI QIDQ1746954FDOQ1746954
Authors: Brian Koziel, Reza Azarderakhsh, David D. Yao
Publication date: 26 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72565-9_4
Recommendations
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- On the Security of Supersingular Isogeny Cryptosystems
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Twisted Edwards Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Cryptographic hash functions from expander graphs
- Title not available (Why is that?)
- Constructing elliptic curve isogenies in quantum subexponential time
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- An Analysis of Goubin’s Refined Power Analysis Attack
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- Fault attack on supersingular isogeny cryptosystems
- Isogeny-based quantum-resistant undeniable signatures
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- Loop-abort faults on supersingular isogeny cryptosystems
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Efficient compression of SIDH public keys
- On fast calculation of addition chains for isogeny-based cryptography
- Identification protocols and signature schemes based on supersingular isogeny problems
Cited In (13)
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
- Faster isogenies for post-quantum cryptography: SIKE
- A power side-channel attack on the Reed-Muller Reed-Solomon version of the HQC cryptosystem
- On the supersingular GPST attack
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Safe-error attacks on SIKE and CSIDH
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Loop-abort faults on supersingular isogeny cryptosystems
- Resistance of isogeny-based cryptographic implementations to a fault attack
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- Exploring SIDH-based signature parameters
This page was built for publication: Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1746954)