Results 101 to 110 of about 1,022 (119)
Some of the next articles are maybe not open access.
Round-Optimal Oblivious Transfer and MPC from Computational CSIDH
IACR Cryptology ePrint Archive, 2022Daniel Masny +4 more
semanticscholar +2 more sources
A faster method for fault attack resistance in static/ephemeral CSIDH
Journal of Cryptographic Engineering, 2023Jason T. LeGrow
semanticscholar +2 more sources
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points
International Workshop on Security, 2019Recently Castryck, Lange, Martindale, Panny, and Renes published CSIDH, a new key exchange scheme using supersingular elliptic curve isogenies. Due to its small key sizes and the possibility of a non-interactive and a static-static key exchange, CSIDH seems very interesting for practical applications. However, the performance is rather slow. Therefore,
Hiroshi Onuki +3 more
semanticscholar +2 more sources
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE [PDF]
SAC ...
Fabio Campos +3 more
semanticscholar +2 more sources
Streamlining CSIDH: Cost-Effective Strategies for Group Actions Evaluation
Information Security ConferenceAhmed Zawia, M. Hasan
semanticscholar +2 more sources
CSURF-TWO: CSIDH for the Ratio (2 : 1)
2021The Commutative Supersingular Isogeny Diffie-Hellman key exchange (CSIDH) uses supersingular elliptic curves of Montgomery form over \(\mathbb {F}_p\) with \(p\equiv 3\) \((\mathrm{mod}\) 8), while CSURF considered those of Montgomery\(^-\) form with \(p\equiv 7\) \((\mathrm{mod}\) 8).
Xuejun Fan, Song Tian, Xiu Xu, Bao Li
openaire +1 more source
Speeding up CSIDH using parallel computation of isogeny
2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA), 2020Isogeny-based cryptography is a promising candidate for post-quantum cryptography. CSIDH is a Diffie-Hellman key exchange protocol based on isogeny with a small public key size and is secure against a quantum computer. However, one of the problems is that it takes a long time to compute the group action corresponding to the secret key.
Ganma Kato, Koutarou Suzuki
openaire +1 more source
HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer From CSIDH
IEEE Transactions on Information Forensics and SecuritySecure Shell (SSH) is a robust cryptographic network protocol designed to establish a secure and encrypted connection over potentially insecure networks, which is typically used for remote login and command-line execution on remote systems.
Mingping Qi, Chi Chen
semanticscholar +1 more source
Towards Optimized and Constant-Time CSIDH on Embedded Devices [PDF]
We present an optimized, constant-time software library for commutative supersingular isogeny Diffie-Hellman key exchange (CSIDH) proposed by Castryck et al. which targets 64-bit ARM processors.
A. Jalali +3 more
semanticscholar +3 more sources
Implementing the Elliptic Curve CSIDH Cryptosystem
International Journal of Mathematical and Computer SciencesWith the advent of quantum computers, it is vital that we have quantum-proof encryption schemes to protect any sensitive data from hackers. One promising scheme is Commutative Supersingular Isogeny Diffie-Hellman, one of the few algorithms that has no ...
William Paulsen, Victoria Mardis
semanticscholar +1 more source

