Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
From MaRDI portal
(Redirected from Publication:742016)
Recommendations
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Supersingular isogeny-based cryptography: a survey
- Constructing elliptic curve isogenies in quantum subexponential time
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Cited in
(only showing first 100 items - show all)- Isogenies on twisted Hessian curves
- Resistance of isogeny-based cryptographic implementations to a fault attack
- Isogeny formulas for Jacobi intersection and twisted Hessian curves
- How to construct quantum FHE, generically
- QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras
- Deuring for the people: supersingular elliptic curves with prescribed endomorphism ring in general characteristic
- The security of all private-key bits in isogeny-based schemes
- Research development on efficient elliptic curve isogenous computations
- Constructing elliptic curve isogenies in quantum subexponential time
- Cryptographic group actions and applications
- Séta: Supersingular Encryption from Torsion Attacks
- Endomorphism rings of supersingular elliptic curves over \(\mathbb{F}_p\)
- Oblivious pseudorandom functions from isogenies
- Accelerating the Delfs-Galbraith algorithm with fast subfield root detection
- Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling
- Post-quantum cryptography from supersingular isogenies
- Post-quantum key exchange for the Internet and the open quantum safe project
- Improved supersingularity testing of elliptic curves
- Optimal strategies for CSIDH
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
- Computing supersingular isogenies on Kummer surfaces
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- CSIDH: an efficient post-quantum commutative group action
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Eliptic curves in post-quantum cryptography
- Efficient computation of \((2^n, 2^n)\)-isogenies
- Exploring SIDH-based signature parameters
- Breaking SIDH in polynomial time
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- SoK: how (not) to design and implement post-quantum cryptography
- Fast computation of elliptic curve isogenies in characteristic two
- Identification protocols and signature schemes based on supersingular isogeny problems
- Delegating supersingular isogenies over \(\mathbb{F}_{p^2}\) with cryptographic applications
- Improved supersingularity testing of elliptic curves using Legendre form
- Trapdoor DDH groups from pairings and isogenies
- Counting Richelot isogenies between superspecial abelian surfaces
- Identification protocols and signature schemes based on supersingular isogeny problems
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Curves, Jacobians, and cryptography
- Efficient compression of SIDH public keys
- Ramanujan graphs in cryptography
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- Constructing canonical strategies for parallel implementation of isogeny based cryptography
- How not to create an isogeny-based PAKE
- \textsf{CSI-RAShi}: distributed key generation for CSIDH
- Memory optimization techniques for computing discrete logarithms in compressed SIKE
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Faster isogenies for post-quantum cryptography: SIKE
- Explicit arithmetic on abelian varieties
- Towards practical key exchange from ordinary isogeny graphs
- Efficient post-quantum undeniable signature on 64-bit ARM
- Cryptographic group and semigroup actions
- Loops, multi-edges and collisions in supersingular isogeny graphs
- On the cost of computing isogenies between supersingular elliptic curves
- On fast calculation of addition chains for isogeny-based cryptography
- Post-quantum static-static key agreement using multiple protocol instances
- Hash functions from superspecial genus-2 curves using Richelot isogenies
- Isogeny-based quantum-resistant undeniable signatures
- Cyclic isogenies for abelian varieties with real multiplication
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- Quantum security analysis of CSIDH
- Quantum cryptanalysis in the RAM model: claw-finding attacks on SIKE
- Computational problems in supersingular elliptic curve isogenies
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
- On isogeny graphs of supersingular elliptic curves over finite fields
- On the hardness of the computational ring-LWR problem and its applications
- On the statistical leak of the GGH13 multilinear map and some variants
- A framework for reducing the overhead of the quantum oracle for use with Grover's algorithm with applications to cryptanalysis of SIKE
- Improved classical cryptanalysis of SIKE in practice
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- Post-Quantum Constant-Round Group Key Exchange from Static Assumptions
- Parallel isogeny path finding with limited memory
- Multiparty non-interactive key exchange and more from isogenies on elliptic curves
- New techniques for SIDH-based NIKE
- Modular polynomials on Hilbert surfaces
- Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- Algebraic approaches for solving isogeny problems of prime power degrees
- Towards isogeny-based password-authenticated key establishment
- Constructing cycles in isogeny graphs of supersingular elliptic curves
- Radical isogenies on Montgomery curves
- Supersingular curves you can trust
- Side channel information set decoding using iterative chunking. Plaintext recovery from the ``Classic McEliece hardware reference implementation
- SIDH proof of knowledge
- Orientations and cycles in supersingular isogeny graphs
- High-degree compression functions on alternative models of elliptic curves and their applications
- Proving knowledge of isogenies: a survey
- Automorphisms of the supersingular isogeny graph
- Faster cryptographic hash function from supersingular isogeny graphs
- Revisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challenge
- Towards a quantum-resistant weak verifiable delay function
- A new adaptive attack on SIDH
- Fully projective radical isogenies in constant-time
- Safe-error attacks on SIKE and CSIDH
- On the Security of Supersingular Isogeny Cryptosystems
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- Bounds on short character sums and \(L\)-functions with characters to a powerful modulus
- An efficient key recovery attack on SIDH
This page was built for publication: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q742016)