On the Security of Supersingular Isogeny Cryptosystems
From MaRDI portal
Publication:2958115
DOI10.1007/978-3-662-53887-6_3zbMath1404.94073OpenAlexW2552090562MaRDI QIDQ2958115
Yan Bo Ti, Steven D. Galbraith, Barak Shani, Christophe Petit
Publication date: 1 February 2017
Published in: Advances in Cryptology – ASIACRYPT 2016 (Search for Journal in Brave)
Full work available at URL: https://ora.ox.ac.uk/objects/uuid:840faec4-382f-44ec-aeac-76bd5962f7cb
Related Items (55)
SoK: how (not) to design and implement post-quantum cryptography ⋮ Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ The Supersingular Isogeny Problem in Genus 2 and Beyond ⋮ Improved torsion-point attacks on SIDH variants ⋮ Towards post-quantum security for signal's X3DH handshake ⋮ On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol ⋮ Quantum lattice enumeration and tweaking discrete pruning ⋮ On the hardness of the computational ring-LWR problem and its applications ⋮ Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4 ⋮ Resistance of isogeny-based cryptographic implementations to a fault attack ⋮ Faster isogenies for post-quantum cryptography: SIKE ⋮ A new adaptive attack on SIDH ⋮ Safe-error attacks on SIKE and CSIDH ⋮ An efficient post-quantum KEM from CSIDH ⋮ Orientations and the supersingular endomorphism ring problem ⋮ On the Isogeny Problem with Torsion Point Information ⋮ The security of all private-key bits in isogeny-based schemes ⋮ Séta: Supersingular Encryption from Torsion Attacks ⋮ SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH ⋮ Supersingular curves you can trust ⋮ Proving knowledge of isogenies: a survey ⋮ M-SIDH and MD-SIDH: countering SIDH attacks by masking information ⋮ New techniques for SIDH-based NIKE ⋮ A new isogeny representation and applications to cryptography ⋮ SIDH proof of knowledge ⋮ ISOGENIES OF ABELIAN VARIETIES IN CRYPTOGRAPHY ⋮ Cryptanalysis of an oblivious PRF from supersingular isogenies ⋮ Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates ⋮ Attack on SHealS and HealS: the second wave of GPST ⋮ Post-quantum signal key agreement from SIDH ⋮ Post-quantum asynchronous deniable key exchange and the signal handshake ⋮ B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion ⋮ Oblivious pseudorandom functions from isogenies ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ How not to create an isogeny-based PAKE ⋮ On the supersingular GPST attack ⋮ Post-quantum static-static key agreement using multiple protocol instances ⋮ Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman ⋮ Supersingular Isogeny-based Cryptography: A Survey ⋮ Computational problems in supersingular elliptic curve isogenies ⋮ On oriented supersingular elliptic curves ⋮ Efficient Compression of SIDH Public Keys ⋮ Towards isogeny-based password-authenticated key establishment ⋮ Algebraic approaches for solving isogeny problems of prime power degrees ⋮ Identification protocols and signature schemes based on supersingular isogeny problems ⋮ Limonnitsa: making Limonnik-3 post-quantum ⋮ One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols ⋮ CSURF-TWO: CSIDH for the ratio \((2:1)\) ⋮ Eliptic curves in post-quantum cryptography ⋮ Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence ⋮ Indifferentiability for public key cryptosystems ⋮ On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves ⋮ SimS: a simplification of SiGamal ⋮ Rational isogenies from irrational endomorphisms
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Cryptographic hash functions from expander graphs
- Arithmétique des algèbres de quaternions
- The insecurity of the elliptic curve digital signature algorithm with partially known nonces
- The insecurity of the digital signature algorithm with partially known nonces
- Elliptic curve cryptosystems in the presence of permanent and transient faults
- Endomorphisms of Abelian varieties over finite fields
- Die Typen der Multiplikatorenringe elliptischer Funktionenkörper
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- On the quaternion -isogeny path problem
- Isogeny-Based Quantum-Resistant Undeniable Signatures
- Lattice Cryptography for the Internet
- GLV/GLS Decomposition, Power Analysis, and Attacks on ECDSA Signatures with Single-Bit Nonce Bias
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes
- The Arithmetic of Elliptic Curves
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- Secure integration of asymmetric and symmetric encryption schemes
- Constructing elliptic curve isogenies in quantum subexponential time
- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants
- Advances in Elliptic Curve Cryptography
- Algorithmic Number Theory
- Lattice attacks on digital signature schemes
This page was built for publication: On the Security of Supersingular Isogeny Cryptosystems