The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
From MaRDI portal
Publication:2129004
DOI10.1007/978-3-030-84252-9_14OpenAlexW3107027842MaRDI QIDQ2129004
Jakub Szefer, Wen Wang, Patrick Longa
Publication date: 22 April 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-84252-9_14
Related Items (4)
Faster isogenies for post-quantum cryptography: SIKE ⋮ A new adaptive attack on SIDH ⋮ On the Isogeny Problem with Torsion Point Information ⋮ Improving support-minors rank attacks: applications to G\textit{e}MSS and Rainbow
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Symmetrical property of the dyadic Green's function for rectangular cavity
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Parallel collision search with cryptanalytic applications
- An efficient quantum collision search algorithm and implications on symmetric cryptography
- On the cost of computing isogenies between supersingular elliptic curves
- The full cost of cryptanalytic attacks
- A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE
- Improved classical cryptanalysis of SIKE in practice
- Implementing Grover oracles for quantum key search on AES and LowMC
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- High Throughput/Gate AES Hardware Architectures Based on Datapath Compression
- Advances in Cryptology - CRYPTO 2003
This page was built for publication: The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3