Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
DOI10.1007/978-3-030-17656-3_15OpenAlexW2902932547MaRDI QIDQ2292880FDOQ2292880
Authors: Daniel J. Bernstein, Tanja Lange, Chloe Martindale, Lorenz Panny
Publication date: 6 February 2020
Full work available at URL: https://research.tue.nl/nl/publications/27d3080c-b960-448c-8b56-cfba98f6f336
Recommendations
elliptic curvesquantum computationreversible computationcryptanalysisisogeniescircuitsconstant-time computation
Cryptography (94A60) Quantum cryptography (quantum-theoretic aspects) (81P94) Networks and circuits as models of computation; circuit complexity (68Q06)
Cited In (28)
- CSIDH on the surface
- A review of mathematical and computational aspects of CSIDH algorithms
- DeCSIDH: delegating isogeny computations in the CSIDH setting
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Concrete analysis of quantum lattice enumeration
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Radical isogenies
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- A note on the security of CSIDH
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- The special case of cyclotomic fields in quantum algorithms for unit groups
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Fast and Frobenius: rational isogeny evaluation over finite fields
- An efficient post-quantum KEM from CSIDH
- Safe-error attacks on SIKE and CSIDH
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- A direct key recovery attack on SIDH
- Threshold schemes from isogeny assumptions
- Disorientation faults in CSIDH
- SCALLOP-HD: group action from 2-dimensional isogenies
- Threshold raccoon: practical threshold signatures from standard lattice assumptions
- Stronger and faster side-channel protections for CSIDH
- Hilbert modular polynomials
- Uniform encodings to elliptic curves and indistinguishable point representation
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
- Optimal strategies for CSIDH
This page was built for publication: Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2292880)