On the security of OSIDH
From MaRDI portal
Publication:5087250
DOI10.1007/978-3-030-97121-2_3zbMATH Open1502.81026OpenAlexW4214534403MaRDI QIDQ5087250FDOQ5087250
Authors: Pierrick Dartois, Luca De Feo
Publication date: 8 July 2022
Published in: Public-Key Cryptography – PKC 2022 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-97121-2_3
Recommendations
Cryptography (94A60) Quantum coding (general) (81P70) Quantum cryptography (quantum-theoretic aspects) (81P94) Elliptic curves (14H52)
Cites Work
- A hierarchy of polynomial time lattice basis reduction algorithms
- Title not available (Why is that?)
- The Arithmetic of Elliptic Curves
- An improved algorithm for computing logarithms over<tex>GF(p)</tex>and its cryptographic significance (Corresp.)
- Title not available (Why is that?)
- Abelian varieties over finite fields
- Title not available (Why is that?)
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Title not available (Why is that?)
- Improved algorithm for the isogeny problem for ordinary elliptic curves
- Title not available (Why is that?)
- Modular polynomials via isogeny volcanoes
- Structure computation and discrete logarithms in finite abelian \(p\)-groups
- New directions in nearest neighbor searching with applications to lattice sieving
- CSIDH: an efficient post-quantum commutative group action
- The randomized slicer for CVPP: sharper, faster, smaller, batchier
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- Random Sampling Revisited: Lattice Enumeration with Discrete Pruning
- SeaSign
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Low-gate quantum golden collision finding
- Title not available (Why is that?)
- Title not available (Why is that?)
- Faster algorithms for isogeny problems using torsion point images
- On oriented supersingular elliptic curves
- On the quaternion \(\ell\)-isogeny path problem
- Orienting supersingular isogeny graphs
- Threshold schemes from isogeny assumptions
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Cryptographic group actions and applications
- Title not available (Why is that?)
- Oblivious pseudorandom functions from isogenies
- On the Security of OSIDH
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices
- The nearest-colattice algorithm: Time-approximation tradeoff for approx-CVP
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
Cited In (8)
- Weak instances of class group action based cryptography via self-pairings
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Full quantum equivalence of group action DLog and CDH, and more
- On the Security of OSIDH
- Post-quantum cryptosystems: open problems and current solutions. Isogeny-based and code-based cryptosystems
- New SIDH countermeasures for a more efficient key exchange
- SCALLOP: scaling the CSI-FiSh
- Orienteering with one endomorphism
Uses Software
This page was built for publication: On the security of OSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5087250)