DeCSIDH: delegating isogeny computations in the CSIDH setting
From MaRDI portal
Publication:6157595
Recommendations
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- SeaSign: compact isogeny signatures from class group actions
- Efficient and secure delegation of exponentiation in general groups to a single malicious server
- A note on the security of CSIDH
- Faster isogenies for post-quantum cryptography: SIKE
Cites work
- scientific article; zbMATH DE number 1256737 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH on the surface
- CSIDH: an efficient post-quantum commutative group action
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- Cryptographic hash functions from expander graphs
- Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
- Faster computation of isogenies of large prime degree
- He gives C-sieves on the CSIDH
- Hide the Modulus: A Secure Non-Interactive Fully Verifiable Delegation Scheme for Modular Exponentiations via CRT
- Quadratic sieving
- Quantum security analysis of CSIDH
- SeaSign: compact isogeny signatures from class group actions
- Theory of Cryptography
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
This page was built for publication: DeCSIDH: delegating isogeny computations in the CSIDH setting
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6157595)