Exploring SIDH-based signature parameters
From MaRDI portal
Publication:6547992
Recommendations
- Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman
- Rational isogenies from irrational endomorphisms
- On the Security of Supersingular Isogeny Cryptosystems
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Loop-abort faults on supersingular isogeny cryptosystems
Cites work
- scientific article; zbMATH DE number 2086722 (Why is no real title available?)
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A direct key recovery attack on SIDH
- A new adaptive attack on SIDH
- An efficient key recovery attack on SIDH
- Breaking SIDH in polynomial time
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH: an efficient post-quantum commutative group action
- Compact, efficient and UC-secure isogeny-based oblivious transfer
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs
- Cryptanalysis of an oblivious PRF from supersingular isogenies
- Cryptographic group actions and applications
- Cryptographic hash functions from expander graphs
- Faster algorithms for isogeny problems using torsion point images
- Faster computation of isogenies of large prime degree
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Identification protocols and signature schemes based on supersingular isogeny problems
- Identification protocols and signature schemes based on supersingular isogeny problems
- Improved torsion-point attacks on SIDH variants
- M-SIDH and MD-SIDH: countering SIDH attacks by masking information
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- Oblivious pseudorandom functions from isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- On the cost of computing isogenies between supersingular elliptic curves
- On the isogeny problem with torsion point information
- On the quaternion \(\ell\)-isogeny path problem
- Orientations and the supersingular endomorphism ring problem
- Parallel collision search with cryptanalytic applications
- Proving knowledge of isogenies: a survey
- Rational isogenies from irrational endomorphisms
- Round-optimal oblivious transfer and MPC from computational CSIDH
- SCALLOP: scaling the CSI-FiSh
- SIDH proof of knowledge
- SQISign: compact post-quantum signatures from quaternions and isogenies
- SeaSign: compact isogeny signatures from class group actions
- Supersingular curves you can trust
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Séta: Supersingular Encryption from Torsion Attacks
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Verifiable delay functions from supersingular isogenies and pairings
Cited in
(2)
This page was built for publication: Exploring SIDH-based signature parameters
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6547992)