A new isogeny representation and applications to cryptography
From MaRDI portal
Publication:6132404
DOI10.1007/978-3-031-22966-4_1zbMATH Open1519.94154MaRDI QIDQ6132404FDOQ6132404
Authors: Antonin Leroux
Publication date: 16 August 2023
Published in: Advances in Cryptology – ASIACRYPT 2022 (Search for Journal in Brave)
Recommendations
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- An alternative approach for SIDH arithmetic
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- scientific article; zbMATH DE number 7623644
- Identification protocols and signature schemes based on supersingular isogeny problems
Cites Work
- Abelian varieties over finite fields
- Title not available (Why is that?)
- Constructing elliptic curve isogenies in quantum subexponential time
- Counting points on elliptic curves over finite fields
- Quaternion Algebras
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs
- CSI-FiSh: efficient isogeny based signatures through class group computations
- SeaSign: compact isogeny signatures from class group actions
- SQISign: compact post-quantum signatures from quaternions and isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Verifiable delay functions from supersingular isogenies and pairings
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves
- Faster computation of isogenies of large prime degree
- Identification protocols and signature schemes based on supersingular isogeny problems
- Isogeny-Based Quantum-Resistant Undeniable Signatures
- Faster algorithms for isogeny problems using torsion point images
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- On the quaternion \(\ell\)-isogeny path problem
- Orienting supersingular isogeny graphs
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Delay encryption
- Oblivious pseudorandom functions from isogenies
- On the Isogeny Problem with Torsion Point Information
- Séta: Supersingular Encryption from Torsion Attacks
- Improved torsion-point attacks on SIDH variants
- A new adaptive attack on SIDH
Cited In (19)
- Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves
- Title not available (Why is that?)
- Towards a quantum-resistant weak verifiable delay function
- On the Security of Supersingular Isogeny Cryptosystems
- Efficient isogeny proofs using generic techniques
- On the feasibility of computing constructive Deuring correspondence
- On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography
- SCALLOP-HD: group action from 2-dimensional isogenies
- Isogeny problems with level structure
- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
- Climbing and descending tall isogeny volcanos
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- Cryptographic group actions and applications
- Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
- New SIDH countermeasures for a more efficient key exchange
- SCALLOP: scaling the CSI-FiSh
This page was built for publication: A new isogeny representation and applications to cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132404)