Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
From MaRDI portal
Publication:1746954
DOI10.1007/978-3-319-72565-9_4zbMath1384.94076OpenAlexW2775917193MaRDI QIDQ1746954
Brian Koziel, Reza Azarderakhsh, David D. W. Yao
Publication date: 26 April 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-72565-9_4
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items
Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4, Resistance of isogeny-based cryptographic implementations to a fault attack, Faster isogenies for post-quantum cryptography: SIKE, Safe-error attacks on SIKE and CSIDH, Roadmap of post-quantum cryptography standardization: side-channel attacks and countermeasures
Cites Work
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- Loop-abort faults on supersingular isogeny cryptosystems
- Fault attack on supersingular isogeny cryptosystems
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Isogeny-Based Quantum-Resistant Undeniable Signatures
- On the Security of Supersingular Isogeny Cryptosystems
- On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Fast Hardware Architectures for Supersingular Isogeny Diffie-Hellman Key Exchange on FPGA
- Zero-Value Point Attacks on Elliptic Curve Cryptosystem
- Twisted Edwards Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
- An Analysis of Goubin’s Refined Power Analysis Attack
- Constructing elliptic curve isogenies in quantum subexponential time
- Efficient Compression of SIDH Public Keys
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- Identification protocols and signature schemes based on supersingular isogeny problems