Low memory attacks on small key CSIDH
From MaRDI portal
Publication:6535121
DOI10.1007/978-3-031-33491-7_11zbMATH Open1542.94115MaRDI QIDQ6535121FDOQ6535121
Authors: Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Publication date: 10 November 2023
Recommendations
Cryptography (94A60) Elliptic curves over global fields (11G05) Quantum cryptography (quantum-theoretic aspects) (81P94) Elliptic curves (14H52)
Cites Work
- On lions and elligators: an efficient constant-time implementation of CSIDH
- Decoding Random Binary Linear Codes in 2 n/20: How 1 + 1 = 0 Improves Information Set Decoding
- Decoding random linear codes in \(\tilde{\mathcal{O}}(2^{0.054n})\)
- Parallel collision search with cryptanalytic applications
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Title not available (Why is that?)
- New directions in nearest neighbor searching with applications to lattice sieving
- Ternary Syndrome Decoding with large weight
- CSIDH: an efficient post-quantum commutative group action
- Decoding linear codes with high error rate and its impact for LPN security
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- On computing nearest neighbors with applications to decoding of binary linear codes
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- On the cost of computing isogenies between supersingular elliptic curves
- Improved classical cryptanalysis of SIKE in practice
- A Generic Algorithm for Small Weight Discrete Logarithms in Composite Groups
- Claw finding algorithms using quantum walk
- Low weight discrete logarithm and subset sum in \(2^{0.65n}\) with polynomial memory
- Stronger and faster side-channel protections for CSIDH
- Cryptographic group actions and applications
- Optimal strategies for CSIDH
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Quantum key search for ternary LWE
- Improved classical and quantum algorithms for subset-sum
- How to meet ternary LWE keys
- McEliece needs a break -- solving McEliece-1284 and quasi-cyclic-2918 with modern ISD
- Parallel isogeny path finding with limited memory
- Memory-efficient attacks on small LWE keys
Cited In (2)
This page was built for publication: Low memory attacks on small key CSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6535121)