The following pages link to He gives C-sieves on the CSIDH (Q2119021):
Displayed 39 items.
- SoK: how (not) to design and implement post-quantum cryptography (Q826276) (← links)
- Towards post-quantum security for signal's X3DH handshake (Q832361) (← links)
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols (Q2056686) (← links)
- An efficient and generic construction for Signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2061966) (← links)
- A fusion algorithm for solving the hidden shift problem in finite abelian groups (Q2118532) (← links)
- \textsf{CSI-RAShi}: distributed key generation for CSIDH (Q2118548) (← links)
- An efficient and generic construction for signal's handshake (X3DH): post-quantum, state leakage secure, and deniable (Q2135524) (← links)
- Post-quantum key-blinding for authentication in anonymity networks (Q2146075) (← links)
- Post-quantum adaptor signature for privacy-preserving off-chain payments (Q2147236) (← links)
- Fully projective radical isogenies in constant-time (Q2152151) (← links)
- Safe-error attacks on SIKE and CSIDH (Q2154061) (← links)
- An efficient post-quantum KEM from CSIDH (Q2154465) (← links)
- Group signatures and more from isogenies and lattices: generic, simple, and efficient (Q2170040) (← links)
- Practical post-quantum signature schemes from isomorphism problems of trilinear forms (Q2170103) (← links)
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293) (← links)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space (Q2685697) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices (Q2692392) (← links)
- Oblivious pseudorandom functions from isogenies (Q2692394) (← links)
- CSIDH on the Surface (Q5041217) (← links)
- On the Security of OSIDH (Q5087250) (← links)
- Séta: Supersingular Encryption from Torsion Attacks (Q6041286) (← links)
- SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH (Q6041287) (← links)
- Group signatures and more from isogenies and lattices: generic, simple, and efficient (Q6041582) (← links)
- SCALLOP: scaling the CSI-FiSh (Q6070766) (← links)
- Generic models for group actions (Q6070770) (← links)
- Disorientation faults in CSIDH (Q6083667) (← links)
- A lower bound on the length of signatures based on group actions and generic isogenies (Q6083676) (← links)
- Candidate trapdoor claw-free functions from group actions with applications to quantum protocols (Q6114234) (← links)
- Full quantum equivalence of group action DLog and CDH, and more (Q6135389) (← links)
- \textsf{CSI-Otter}: isogeny-based (partially) blind signatures from the class group action with a twist (Q6145968) (← links)
- Optimizing quantum space using spooky pebble games (Q6148116) (← links)
- DeCSIDH: delegating isogeny computations in the CSIDH setting (Q6157595) (← links)
- Key-oblivious encryption from isogenies with application to accountable tracing signatures (Q6157596) (← links)
- MR-DSS -- smaller MinRank-based (ring-)signatures (Q6166980) (← links)
- On actively secure fine-grained access structures from isogeny assumptions (Q6166994) (← links)
- Attack on SHealS and HealS: the second wave of GPST (Q6166995) (← links)
- Post-quantum asynchronous deniable key exchange and the signal handshake (Q6169026) (← links)
- Two remarks on the vectorization problem (Q6169495) (← links)