On the security of OSIDH
From MaRDI portal
Publication:5087250
Recommendations
Cites work
- scientific article; zbMATH DE number 435565 (Why is no real title available?)
- scientific article; zbMATH DE number 3908520 (Why is no real title available?)
- scientific article; zbMATH DE number 503244 (Why is no real title available?)
- scientific article; zbMATH DE number 706265 (Why is no real title available?)
- scientific article; zbMATH DE number 2086697 (Why is no real title available?)
- scientific article; zbMATH DE number 6164023 (Why is no real title available?)
- scientific article; zbMATH DE number 7561389 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- A hierarchy of polynomial time lattice basis reduction algorithms
- Abelian varieties over finite fields
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Cryptographic group actions and applications
- Faster algorithms for isogeny problems using torsion point images
- He gives C-sieves on the CSIDH
- Improved algorithm for the isogeny problem for ordinary elliptic curves
- Low-gate quantum golden collision finding
- Modular polynomials via isogeny volcanoes
- New directions in nearest neighbor searching with applications to lattice sieving
- Oblivious pseudorandom functions from isogenies
- On oriented supersingular elliptic curves
- On the quaternion \(\ell\)-isogeny path problem
- On the security of OSIDH
- Orienting supersingular isogeny graphs
- Quantum security analysis of CSIDH
- Random sampling revisited: lattice enumeration with discrete pruning
- SeaSign
- SeaSign: compact isogeny signatures from class group actions
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- Structure computation and discrete logarithms in finite abelian \(p\)-groups
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- The Arithmetic of Elliptic Curves
- The nearest-colattice algorithm: time-approximation tradeoff for approx-CVP
- The randomized slicer for CVPP: sharper, faster, smaller, batchier
- Threshold schemes from isogeny assumptions
Cited in
(12)- Orienteering with one endomorphism
- On oriented supersingular elliptic curves
- On collisions related to an ideal class of order 3 in CSIDH
- On the security of OSIDH
- Post-quantum cryptosystems: open problems and current solutions. Isogeny-based and code-based cryptosystems
- Weak instances of class group action based cryptography via self-pairings
- New SIDH countermeasures for a more efficient key exchange
- Full quantum equivalence of group action DLog and CDH, and more
- An exposure model for supersingular isogeny Diffie-Hellman key exchange
- SCALLOP: scaling the CSI-FiSh
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Improved torsion-point attacks on SIDH variants
This page was built for publication: On the security of OSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5087250)