Séta: Supersingular Encryption from Torsion Attacks
From MaRDI portal
Publication:6041286
Recommendations
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Cites work
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- CSIDH: an efficient post-quantum commutative group action
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Constructing supersingular elliptic curves
- Cryptographic hash functions from expander graphs
- Expander graphs based on GRH with an application to elliptic curve cryptography
- Faster algorithms for isogeny problems using torsion point images
- Faster computation of isogenies of large prime degree
- He gives C-sieves on the CSIDH
- Identification protocols and signature schemes based on supersingular isogeny problems
- Identifying the matrix ring: algorithms for quaternion algebras and quadratic forms
- NON-BACKTRACKING RANDOM WALKS MIX FASTER
- On the Security of Supersingular Isogeny Cryptosystems
- On the quaternion \(\ell\)-isogeny path problem
- Orienting supersingular isogeny graphs
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms
- Quantum security analysis of CSIDH
- SQISign: compact post-quantum signatures from quaternions and isogenies
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- Supersingular curves with small noninteger endomorphisms
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Supersingular j-invariants as singular moduli mod p
- The Arithmetic of Elliptic Curves
- The Uber-Assumption Family
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(28)- Breaking SIDH in polynomial time
- Orienteering with one endomorphism
- Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
- Orientations and the supersingular endomorphism ring problem
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Robustly reusable fuzzy extractor from isogeny
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Attack on SHealS and HealS: the second wave of GPST
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- Cryptographic smooth neighbors
- A new isogeny representation and applications to cryptography
- Supersingular curves you can trust
- Key-oblivious encryption from isogenies with application to accountable tracing signatures
- Orientations and cycles in supersingular isogeny graphs
- An effective lower bound on the number of orientable supersingular elliptic curves
- A direct key recovery attack on SIDH
- An efficient key recovery attack on SIDH
- On the feasibility of computing constructive Deuring correspondence
- Finding orientations of supersingular elliptic curves and quaternion orders
- Isogeny problems with level structure
- QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras
- Updatable threshold encryption from isogenies
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees
- Exploring SIDH-based signature parameters
- New SIDH countermeasures for a more efficient key exchange
- SCALLOP: scaling the CSI-FiSh
This page was built for publication: Séta: Supersingular Encryption from Torsion Attacks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6041286)