Resistance of isogeny-based cryptographic implementations to a fault attack
DOI10.1007/978-3-030-89915-8_12zbMATH Open1491.94067OpenAlexW3185958608MaRDI QIDQ2145308FDOQ2145308
Simon Pontié, Élise Tasso, Luca De Feo, Nadia El Mrabet
Publication date: 17 June 2022
Full work available at URL: https://hal-cea.archives-ouvertes.fr/cea-03266892/file/resistance_of_isogeny-based_cryptographic_implementations_to_a_fault_attack_eprint.pdf
Recommendations
- Loop-abort faults on supersingular isogeny cryptosystems
- Safe-error attacks on SIKE and CSIDH
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Fault attack on supersingular isogeny cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- The Arithmetic of Elliptic Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Title not available (Why is that?)
- Title not available (Why is that?)
- A modular analysis of the Fujisaki-Okamoto transformation
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Fault attack on supersingular isogeny cryptosystems
- Faster isogeny-based compressed key agreement
- Loop-abort faults on supersingular isogeny cryptosystems
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Efficient Compression of SIDH Public Keys
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
- Side-Channel Analysis and Countermeasure Design on ARM-Based Quantum-Resistant SIKE
Cited In (5)
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Safe-error attacks on SIKE and CSIDH
- Disorientation faults in CSIDH
- Loop-abort faults on supersingular isogeny cryptosystems
Uses Software
This page was built for publication: Resistance of isogeny-based cryptographic implementations to a fault attack
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2145308)