Results 91 to 100 of about 1,022 (119)

Safe-Error Attacks on SIKE and CSIDH [PDF]

open access: yesIACR Cryptology ePrint Archive, 2021
The isogeny-based post-quantum schemes SIKE (NIST PQC round 3 alternate candidate) and CSIDH (Asiacrypt 2018) have received only little attention with respect to their fault attack resilience so far.
Fabio Campos   +2 more
semanticscholar   +4 more sources

He Gives C-Sieves on the CSIDH

IACR Cryptology ePrint Archive, 2020
Recently, Castryck, Lange, Martindale, Panny, and Renes proposed CSIDH (pronounced “sea-side”) as a candidate post-quantum “commutative group action.” It has attracted much attention and interest, in part because it enables noninteractive Diffie–Hellman ...
Chris Peikert
semanticscholar   +2 more sources

CSI-IBBS: Identity-Based Blind Signature using CSIDH

open access: yesarXiv.org
Identity-based cryptography (IBC), proposed by Adi Shamir, revolutionized public key authentication by eliminating the need for certificates, enabling a more efficient and scalable approach to cryptographic systems. Meanwhile, in \cite{Katsumata2024group}
Soumya Bhoumik   +3 more
semanticscholar   +3 more sources

Practical Robust DKG Protocols for CSIDH

International Conference on Applied Cryptography and Network Security, 2023
Shahla Atapoor   +3 more
semanticscholar   +2 more sources

A Constant-Time Hardware Architecture for the CSIDH Key-Exchange Protocol

open access: yesarXiv.org
The commutative supersingular isogeny Diffie-Hellman (CSIDH) algorithm is a promising post-quantum key exchange protocol, notable for its exceptionally small key sizes, but hindered by computationally intensive key generation.
Sina Bagheri   +4 more
semanticscholar   +3 more sources

CSIDH: An Efficient Post-Quantum Commutative Group Action [PDF]

open access: yesIACR Cryptology ePrint Archive, 2018
We propose an efficient commutative group action suitable for non-interactive key exchange in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev–Stolbunov cryptosystem, but we apply it to supersingular elliptic curves defined over a large prime field Fp, rather than to ordinary elliptic curves.
W. Castryck   +4 more
semanticscholar   +7 more sources

Low Memory Attacks on Small Key CSIDH

International Conference on Applied Cryptography and Network Security, 2023
Jesús-Javier Chi-Domínguez   +3 more
semanticscholar   +2 more sources

Home - About - Disclaimer - Privacy