SIDH
From MaRDI portal
Cited in
(35)- Identification protocols and signature schemes based on supersingular isogeny problems
- Improved supersingularity testing of elliptic curves using Legendre form
- Many a mickle makes a muckle: a framework for provably quantum-secure hybrid key exchange
- Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
- Efficient compression of SIDH public keys
- A key manipulation attack on some recent isogeny-based key agreement protocols
- Faster isogenies for post-quantum cryptography: SIKE
- On fast calculation of addition chains for isogeny-based cryptography
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- SIKE round 2 speed record on ARM Cortex-M4
- Computational problems in supersingular elliptic curve isogenies
- New techniques for SIDH-based NIKE
- HMQV
- AVIsogenies
- Curve25519
- CSIDH
- PQM4
- A new adaptive attack on SIDH
- On the Security of Supersingular Isogeny Cryptosystems
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- The cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3
- Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography
- Group key exchange protocols from supersingular isogenies
- Ed448-Goldilocks
- SeaSign
- SIKE
- Simplified isogeny formulas on twisted Jacobi quartic curves
- FreePDK45
- Resistance of isogeny-based cryptographic implementations to a fault attack
- The security of all private-key bits in isogeny-based schemes
- CSIDH
- Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4
- vOW4SIKE
- VexRiscv
- Eliptic curves in post-quantum cryptography
This page was built for software: SIDH