Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
From MaRDI portal
Publication:2292880
Recommendations
Cited in
(28)- CSIDH on the surface
- A review of mathematical and computational aspects of CSIDH algorithms
- DeCSIDH: delegating isogeny computations in the CSIDH setting
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Radical isogenies
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Concrete analysis of quantum lattice enumeration
- A note on the security of CSIDH
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- A trade-off between classical and quantum circuit size for an attack against CSIDH
- The special case of cyclotomic fields in quantum algorithms for unit groups
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Fast and Frobenius: rational isogeny evaluation over finite fields
- An efficient post-quantum KEM from CSIDH
- Safe-error attacks on SIKE and CSIDH
- Group signatures and more from isogenies and lattices: generic, simple, and efficient
- A direct key recovery attack on SIDH
- Threshold schemes from isogeny assumptions
- Disorientation faults in CSIDH
- SCALLOP-HD: group action from 2-dimensional isogenies
- Threshold raccoon: practical threshold signatures from standard lattice assumptions
- Stronger and faster side-channel protections for CSIDH
- Hilbert modular polynomials
- Uniform encodings to elliptic curves and indistinguishable point representation
- Optimal strategies for CSIDH
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
This page was built for publication: Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2292880)