An efficient authenticated key exchange from random self-reducibility on CSIDH
From MaRDI portal
Publication:831632
Cites work
- scientific article; zbMATH DE number 1618043 (Why is no real title available?)
- scientific article; zbMATH DE number 1722690 (Why is no real title available?)
- CSIDH: an efficient post-quantum commutative group action
- Class Field Theory
- Computational problems in supersingular elliptic curve isogenies
- Faster computation of isogenies of large prime degree
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Highly efficient key exchange protocols with optimal tightness
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- One-round authenticated group key exchange from isogenies
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- Stronger Security of Authenticated Key Exchange
- Strongly secure authenticated key exchange from supersingular isogenies
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cited in
(11)- Okamoto-Tanaka Revisited: Fully Authenticated Diffie-Hellman with Minimal Overhead
- Group action key encapsulation and non-interactive key exchange in the QROM
- Post-quantum asynchronous deniable key exchange and the signal handshake
- Practical isogeny-based key-exchange with optimal tightness
- Towards post-quantum security for signal's X3DH handshake
- Password-authenticated key exchange from group actions
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Key exchange with tight (full) forward secrecy via key confirmation
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
This page was built for publication: An efficient authenticated key exchange from random self-reducibility on CSIDH
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q831632)