Results 101 to 110 of about 1,022 (119)
Some of the next articles are maybe not open access.

Round-Optimal Oblivious Transfer and MPC from Computational CSIDH

IACR Cryptology ePrint Archive, 2022
Daniel Masny   +4 more
semanticscholar   +2 more sources

(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points

International Workshop on Security, 2019
Recently Castryck, Lange, Martindale, Panny, and Renes published CSIDH, a new key exchange scheme using supersingular elliptic curve isogenies. Due to its small key sizes and the possibility of a non-interactive and a static-static key exchange, CSIDH seems very interesting for practical applications. However, the performance is rather slow. Therefore,
Hiroshi Onuki   +3 more
semanticscholar   +2 more sources

Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE [PDF]

open access: yesACM Symposium on Applied Computing, 2022
SAC ...
Fabio Campos   +3 more
semanticscholar   +2 more sources

CSURF-TWO: CSIDH for the Ratio (2 : 1)

2021
The Commutative Supersingular Isogeny Diffie-Hellman key exchange (CSIDH) uses supersingular elliptic curves of Montgomery form over \(\mathbb {F}_p\) with \(p\equiv 3\) \((\mathrm{mod}\) 8), while CSURF considered those of Montgomery\(^-\) form with \(p\equiv 7\) \((\mathrm{mod}\) 8).
Xuejun Fan, Song Tian, Xiu Xu, Bao Li
openaire   +1 more source

Speeding up CSIDH using parallel computation of isogeny

2020 7th International Conference on Advance Informatics: Concepts, Theory and Applications (ICAICTA), 2020
Isogeny-based cryptography is a promising candidate for post-quantum cryptography. CSIDH is a Diffie-Hellman key exchange protocol based on isogeny with a small public key size and is secure against a quantum computer. However, one of the problems is that it takes a long time to compute the group action corresponding to the secret key.
Ganma Kato, Koutarou Suzuki
openaire   +1 more source

HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer From CSIDH

IEEE Transactions on Information Forensics and Security
Secure Shell (SSH) is a robust cryptographic network protocol designed to establish a secure and encrypted connection over potentially insecure networks, which is typically used for remote login and command-line execution on remote systems.
Mingping Qi, Chi Chen
semanticscholar   +1 more source

Towards Optimized and Constant-Time CSIDH on Embedded Devices [PDF]

open access: yesInternational Workshop on Constructive Side-Channel Analysis and Secure Design, 2019
We present an optimized, constant-time software library for commutative supersingular isogeny Diffie-Hellman key exchange (CSIDH) proposed by Castryck et al. which targets 64-bit ARM processors.
A. Jalali   +3 more
semanticscholar   +3 more sources

Implementing the Elliptic Curve CSIDH Cryptosystem

International Journal of Mathematical and Computer Sciences
With the advent of quantum computers, it is vital that we have quantum-proof encryption schemes to protect any sensitive data from hackers. One promising scheme is Commutative Supersingular Isogeny Diffie-Hellman, one of the few algorithms that has no ...
William Paulsen, Victoria Mardis
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy