Séta: Supersingular Encryption from Torsion Attacks
From MaRDI portal
Publication:6041286
DOI10.1007/978-3-030-92068-5_9zbMATH Open1514.94073OpenAlexW4200380216MaRDI QIDQ6041286FDOQ6041286
Javier Silva, Péter Kutas, Luca De Feo, Tako Boris Fouotsa, Cyprien Delpech De Saint Guilhem, Christophe Petit, Benjamin Wesolowski, Antonin Leroux
Publication date: 26 May 2023
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-030-92068-5_9
Recommendations
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Cites Work
- The Arithmetic of Elliptic Curves
- Cryptographic hash functions from expander graphs
- NON-BACKTRACKING RANDOM WALKS MIX FASTER
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Identifying the Matrix Ring: Algorithms for Quaternion Algebras and Quadratic Forms
- The Uber-Assumption Family
- Supersingular j-invariants as singular moduli mod p
- CSIDH: an efficient post-quantum commutative group action
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- SQISign: compact post-quantum signatures from quaternions and isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- Faster computation of isogenies of large prime degree
- Constructing supersingular elliptic curves
- Faster algorithms for isogeny problems using torsion point images
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Identification protocols and signature schemes based on supersingular isogeny problems
- On the quaternion \(\ell\)-isogeny path problem
- Orienting supersingular isogeny graphs
- Supersingular curves with small noninteger endomorphisms
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
Cited In (26)
- Orientations and the supersingular endomorphism ring problem
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Robustly reusable fuzzy extractor from isogeny
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Attack on SHealS and HealS: the second wave of GPST
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- Cryptographic smooth neighbors
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- A new isogeny representation and applications to cryptography
- Supersingular curves you can trust
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Orientations and cycles in supersingular isogeny graphs
- An effective lower bound on the number of orientable supersingular elliptic curves
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- On the feasibility of computing constructive Deuring correspondence
- Finding orientations of supersingular elliptic curves and quaternion orders
- Isogeny problems with level structure
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
- SCALLOP: scaling the CSI-FiSh
- Breaking SIDH in polynomial time
- Orienteering with one endomorphism
- Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
This page was built for publication: Séta: Supersingular Encryption from Torsion Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041286)