Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
From MaRDI portal
Publication:2229293
DOI10.1007/978-3-030-57808-4_24OpenAlexW2982388819MaRDI QIDQ2229293FDOQ2229293
Brian Koziel, Reza Azarderakhsh, Jason T. LeGrow, Aaron Hutchinson
Publication date: 23 February 2021
Full work available at URL: https://doi.org/10.1007/978-3-030-57808-4_24
Cites Work
- On Lions and elligators: an efficient constant-time implementation of CSIDH
- Title not available (Why is that?)
- Distributed Computing: A Locality-Sensitive Approach
- Communication Complexity
- Title not available (Why is that?)
- Branching and bounds tighteningtechniques for non-convex MINLP
- Pseudorandomness
- What Can be Computed Locally?
- Removing randomness in parallel computation without a processor penalty
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- CSIDH: an efficient post-quantum commutative group action
- How to construct CSIDH on Edwards curves
- He gives C-sieves on the CSIDH
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- A faster way to the CSIDH
- Constructing canonical strategies for parallel implementation of isogeny based cryptography
- Stronger and faster side-channel protections for CSIDH
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- The Cost of Unknown Diameter in Dynamic Networks
Cited In (13)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
- How not to create an isogeny-based PAKE
- A review of mathematical and computational aspects of CSIDH algorithms
- (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH
- Fully projective radical isogenies in constant-time
- Low memory attacks on small key CSIDH
- CSIDH on the Surface
- Disorientation faults in CSIDH
- Towards optimized and constant-time CSIDH on embedded devices
- Optimal strategies for CSIDH
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Effective pairings in isogeny-based cryptography
This page was built for publication: Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2229293)