A new adaptive attack on SIDH
From MaRDI portal
Publication:2152168
DOI10.1007/978-3-030-95312-6_14zbMATH Open1492.94107OpenAlexW4210767037MaRDI QIDQ2152168FDOQ2152168
Publication date: 6 July 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-95312-6_14
Recommendations
Cites Work
- The Arithmetic of Elliptic Curves
- Title not available (Why is that?)
- Secure integration of asymmetric and symmetric encryption schemes
- Elliptic curves. Number theory and cryptography
- Mathematics of public key cryptography.
- Parallel collision search with cryptanalytic applications
- Cryptographic hash functions from expander graphs
- Constructing elliptic curve isogenies in quantum subexponential time
- Nonsingular plane cubic curves over finite fields
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- A modular analysis of the Fujisaki-Okamoto transformation
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Post-quantum static-static key agreement using multiple protocol instances
- New techniques for SIDH-based NIKE
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- Identification protocols and signature schemes based on supersingular isogeny problems
- Low-gate quantum golden collision finding
- Faster algorithms for isogeny problems using torsion point images
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Supersingular curves with small noninteger endomorphisms
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Improved torsion-point attacks on SIDH variants
Cited In (11)
- Attack on SHealS and HealS: the second wave of GPST
- A new isogeny representation and applications to cryptography
- New techniques for SIDH-based NIKE
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- SIDH proof of knowledge
- Towards a quantum-resistant weak verifiable delay function
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
Uses Software
This page was built for publication: A new adaptive attack on SIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152168)