Dual isogenies and their application to public-key compression for isogeny-based cryptography
From MaRDI portal
Publication:2176649
Recommendations
Cited in
(13)- Isogeny-based key compression without pairings
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Memory optimization techniques for computing discrete logarithms in compressed SIKE
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees
- Resistance of isogeny-based cryptographic implementations to a fault attack
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Efficient compression of SIDH public keys
- Faster isogenies for post-quantum cryptography: SIKE
- SQISign: compact post-quantum signatures from quaternions and isogenies
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- SCALLOP: scaling the CSI-FiSh
- Faster isogeny-based compressed key agreement
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
This page was built for publication: Dual isogenies and their application to public-key compression for isogeny-based cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2176649)