A new adaptive attack on SIDH
From MaRDI portal
Publication:2152168
Recommendations
Cites work
- scientific article; zbMATH DE number 706265 (Why is no real title available?)
- A modular analysis of the Fujisaki-Okamoto transformation
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic hash functions from expander graphs
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Elliptic curves. Number theory and cryptography
- Faster algorithms for isogeny problems using torsion point images
- Identification protocols and signature schemes based on supersingular isogeny problems
- Improved torsion-point attacks on SIDH variants
- Low-gate quantum golden collision finding
- Mathematics of public key cryptography.
- New techniques for SIDH-based NIKE
- Nonsingular plane cubic curves over finite fields
- On the Security of Supersingular Isogeny Cryptosystems
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Parallel collision search with cryptanalytic applications
- Post-quantum static-static key agreement using multiple protocol instances
- Secure integration of asymmetric and symmetric encryption schemes
- Supersingular curves with small noninteger endomorphisms
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- The Arithmetic of Elliptic Curves
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(15)- Secret keys in genus-2 SIDH
- Improved torsion-point attacks on SIDH variants
- Attack on SHealS and HealS: the second wave of GPST
- On adaptive attacks against Jao-Urbanik's isogeny-based protocol
- On the supersingular GPST attack
- A new isogeny representation and applications to cryptography
- New techniques for SIDH-based NIKE
- Key-recovery by side-channel information on the matrix-vector product in code-based cryptosystems
- SIDH proof of knowledge
- Towards a quantum-resistant weak verifiable delay function
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
This page was built for publication: A new adaptive attack on SIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2152168)