Pages that link to "Item:Q2229293"
From MaRDI portal
The following pages link to Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293):
Displaying 11 items.
- Optimal strategies for CSIDH (Q2085717) (← links)
- (Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH (Q2128759) (← links)
- Fully projective radical isogenies in constant-time (Q2152151) (← links)
- How not to create an isogeny-based PAKE (Q2229270) (← links)
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors (Q2229293) (← links)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space (Q2685697) (← links)
- CSIDH on the Surface (Q5041217) (← links)
- Low memory attacks on small key CSIDH (Q6535121) (← links)
- Compressed M-SIDH: an instance of compressed SIDH-like schemes with isogenies of highly composite degrees (Q6544474) (← links)
- A review of mathematical and computational aspects of CSIDH algorithms (Q6580190) (← links)
- Effective pairings in isogeny-based cryptography (Q6619926) (← links)