Faster isogenies for post-quantum cryptography: SIKE
From MaRDI portal
Publication:2152149
DOI10.1007/978-3-030-95312-6_3zbMATH Open1492.94097OpenAlexW4210362437MaRDI QIDQ2152149FDOQ2152149
Authors: Rami Elkhatib, Brian Koziel, Reza Azarderakhsh
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_3
Recommendations
- SIKE round 2 speed record on ARM Cortex-M4
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- An alternative approach for SIDH arithmetic
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
Cites Work
- Cryptographic hash functions from expander graphs
- Title not available (Why is that?)
- Constructing elliptic curve isogenies in quantum subexponential time
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- CSIDH: an efficient post-quantum commutative group action
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- On the cost of computing isogenies between supersingular elliptic curves
- Improved classical cryptanalysis of SIKE in practice
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Identification protocols and signature schemes based on supersingular isogeny problems
- Fault attack on supersingular isogeny cryptosystems
- How not to create an isogeny-based PAKE
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Loop-abort faults on supersingular isogeny cryptosystems
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Efficient compression of SIDH public keys
- Towards isogeny-based password-authenticated key establishment
- Isogeny-based key compression without pairings
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
- Optimized algorithms and architectures for Montgomery multiplication for post-quantum cryptography
- Title not available (Why is that?)
- Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography
- Title not available (Why is that?)
Cited In (10)
- The superlinearity problem in post-quantum blockchains
- Constructing canonical strategies for parallel implementation of isogeny based cryptography
- Fast NEON-based multiplication for lattice-based NIST post-quantum cryptography finalists
- Memory optimization techniques for computing discrete logarithms in compressed SIKE
- DeCSIDH: delegating isogeny computations in the CSIDH setting
- SIKE round 2 speed record on ARM Cortex-M4
- Improved classical cryptanalysis of SIKE in practice
- Title not available (Why is that?)
- An alternative approach for SIDH arithmetic
- Dual isogenies and their application to public-key compression for isogeny-based cryptography
Uses Software
This page was built for publication: Faster isogenies for post-quantum cryptography: SIKE
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152149)