Practical isogeny-based key-exchange with optimal tightness
From MaRDI portal
Publication:832367
DOI10.1007/978-3-030-81652-0_18zbMATH Open1485.94079OpenAlexW3202116954MaRDI QIDQ832367FDOQ832367
Authors: Bor de Kock, Kristian Gjøsteen, Mattia Veroni
Publication date: 25 March 2022
Full work available at URL: https://doi.org/10.1007/978-3-030-81652-0_18
Recommendations
- Supersingular isogeny Diffie-Hellman authenticated key exchange
- One-round authenticated group key exchange from isogenies
- Strongly secure authenticated key exchange from supersingular isogenies
- Towards practical key exchange from ordinary isogeny graphs
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
Cites Work
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- The Arithmetic of Elliptic Curves
- How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
- Elliptic curves. Number theory and cryptography
- Die Typen der Multiplikatorenringe elliptischer Funktionenkörper
- Title not available (Why is that?)
- Stronger Security of Authenticated Key Exchange
- Public Key Cryptography - PKC 2006
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- On the Impossibility of Tight Cryptographic Reductions
- On the evaluation of modular polynomials
- CSIDH: an efficient post-quantum commutative group action
- SeaSign: compact isogeny signatures from class group actions
- Highly efficient key exchange protocols with optimal tightness
- Title not available (Why is that?)
- On the security of TLS-DHE in the standard model
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Strongly secure authenticated key exchange from supersingular isogenies
- On the Security of the TLS Protocol: A Systematic Analysis
- Proving the TLS Handshake Secure (As It Is)
- An efficient authenticated key exchange from random self-reducibility on CSIDH
Cited In (13)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
- Post-quantum anonymous one-sided authenticated key exchange without random oracles
- Post-quantum asynchronous deniable key exchange and the signal handshake
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
- Group action key encapsulation and non-interactive key exchange in the QROM
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable
- Solving the hidden number problem for CSIDH and CSURF via automated Coppersmith
- Strongly secure authenticated key exchange from supersingular isogenies
- Another look at tightness. II: Practical issues in cryptography
- Lattice-based authenticated key exchange with tight security
- Password-authenticated key exchange from group actions
- Key exchange with tight (full) forward secrecy via key confirmation
- Generic models for group actions
Uses Software
This page was built for publication: Practical isogeny-based key-exchange with optimal tightness
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q832367)