Results 111 to 119 of about 1,022 (119)
Some of the next articles are maybe not open access.
Solving the Hidden Number Problem for CSIDH and CSURF via Automated Coppersmith
IACR Cryptology ePrint Archive, 2023Jonas Meers, Julian Nowakowski
semanticscholar +1 more source
Kohei Nakagawa +3 more
semanticscholar +1 more source
Fault Injection Attacks on RSA and CSIDH
Fault injection attacks are attacks where the attackers intentionally induce the fault in the device during the operation to obtain or recover secret information. The induced fault will impact the operation and cause the faulty output, providing the information to attackers. Many cryptographic algorithms and devices have been proven vulnerable to faultopenaire +1 more source
Lossy CSI-FiSh: Efficient Signature Scheme with Tight Reduction to Decisional CSIDH-512
IACR Cryptology ePrint Archive, 2020A. Kaafarani +2 more
semanticscholar +1 more source
On Lions and Elligators: An efficient constant-time implementation of CSIDH
IACR Cryptology ePrint Archive, 2019Michael Meyer, Fabio Campos, S. Reith
semanticscholar +1 more source
Improving the CSIDH Protocol for Multi-Party Cryptography
Mohammed EL Baraka, Siham Ezzouakopenaire +1 more source

