Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
From MaRDI portal
Publication:2835601
Recommendations
- Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol
- scientific article; zbMATH DE number 7385900
- On the Security of Supersingular Isogeny Cryptosystems
- Supersingular isogeny-based cryptography: a survey
- scientific article; zbMATH DE number 1839433
- scientific article; zbMATH DE number 176556
- Computational problems in supersingular elliptic curve isogenies
- Supersingular isogeny key exchange for beginners
Cites work
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- scientific article; zbMATH DE number 3877077 (Why is no real title available?)
- scientific article; zbMATH DE number 1186948 (Why is no real title available?)
- scientific article; zbMATH DE number 1302781 (Why is no real title available?)
- scientific article; zbMATH DE number 1088239 (Why is no real title available?)
- scientific article; zbMATH DE number 1759775 (Why is no real title available?)
- scientific article; zbMATH DE number 1878328 (Why is no real title available?)
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- Advances in Elliptic Curve Cryptography
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Claw finding algorithms using quantum walk
- Computing and Combinatorics
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Constructing supersingular elliptic curves
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Endomorphisms of Abelian varieties over finite fields
- Evidence that XTR is more secure than supersingular elliptic curve cryptosystems
- Faster explicit formulas for computing pairings over ordinary curves
- Hidden fields equations (HFE) and isomorphisms of polynomials (IP): two new families of asymmetric algorithms
- Identifying supersingular elliptic curves
- Improved algorithm for the isogeny problem for ordinary elliptic curves
- Modular Multiplication Without Trial Division
- Public Key Cryptography - PKC 2006
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- The Arithmetic of Elliptic Curves
- Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems
- Topics in Cryptology – CT-RSA 2005
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(72)- Effective pairings in isogeny-based cryptography
- Breaking SIDH in polynomial time
- On the security of OSIDH
- Identification protocols and signature schemes based on supersingular isogeny problems
- Pre- and post-quantum Diffie-Hellman from groups, actions, and isogenies
- Improved supersingularity testing of elliptic curves using Legendre form
- Practical isogeny-based key-exchange with optimal tightness
- Improved torsion-point attacks on SIDH variants
- Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- Efficient compression of SIDH public keys
- Optimized Modular Multiplication for Supersingular Isogeny Diffie-Hellman
- Optimized algorithms and architectures for Montgomery multiplication for post-quantum cryptography
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A faster way to the CSIDH
- How not to create an isogeny-based PAKE
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Faster isogenies for post-quantum cryptography: SIKE
- Towards practical key exchange from ordinary isogeny graphs
- Efficient post-quantum undeniable signature on 64-bit ARM
- HILA5: on reliability, reconciliation, and error correction for Ring LWE encryption
- On the cost of computing isogenies between supersingular elliptic curves
- On fast calculation of addition chains for isogeny-based cryptography
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Post-quantum static-static key agreement using multiple protocol instances
- Benchmarking post-quantum cryptography in TLS
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- SIKE round 2 speed record on ARM Cortex-M4
- Computational problems in supersingular elliptic curve isogenies
- On the hardness of the computational ring-LWR problem and its applications
- On the statistical leak of the GGH13 multilinear map and some variants
- Improved classical cryptanalysis of SIKE in practice
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Verifiable delay functions from supersingular isogenies and pairings
- Faster isogeny-based compressed key agreement
- Towards isogeny-based password-authenticated key establishment
- Optimized arithmetic operations for isogeny-based cryptography on Huff curves
- Faster cryptographic hash function from supersingular isogeny graphs
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- Revisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challenge
- A new adaptive attack on SIDH
- An efficient post-quantum KEM from CSIDH
- On the Security of Supersingular Isogeny Cryptosystems
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- scientific article; zbMATH DE number 1839433 (Why is no real title available?)
- Efficient isogeny proofs using generic techniques
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Efficiency of SIDH-based signatures (yes, SIDH)
- Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography
- Delay encryption
- Group key exchange protocols from supersingular isogenies
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Efficient finite field multiplication for isogeny based post quantum cryptography
- An alternative approach for SIDH arithmetic
- Isogeny-based key compression without pairings
- Simplified isogeny formulas on twisted Jacobi quartic curves
- Resistance of isogeny-based cryptographic implementations to a fault attack
- The security of all private-key bits in isogeny-based schemes
- Multidimensional quantum walks
- Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling
- Post-quantum key exchange for the Internet and the open quantum safe project
- Optimal strategies for CSIDH
- EdSIDH: supersingular isogeny Diffie-Hellman key exchange on Edwards curves
- Computing supersingular isogenies on Kummer surfaces
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- CSIDH: an efficient post-quantum commutative group action
- Eliptic curves in post-quantum cryptography
- On lions and elligators: an efficient constant-time implementation of CSIDH
- New SIDH countermeasures for a more efficient key exchange
This page was built for publication: Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2835601)