Results 11 to 20 of about 1,022 (119)

Quantum Security Analysis of CSIDH [PDF]

open access: yesInternational Conference on the Theory and Application of Cryptographic Techniques, 2020
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on supersingular elliptic curve isogenies. It is similar in design to a previous scheme by Couveignes, Rostovtsev and Stolbunov, but aims at an improved balance between ...
X. Bonnetain, A. Schrottenloher
semanticscholar   +8 more sources

CSIDH on the surface [PDF]

open access: yesIACR Cryptology ePrint Archive, 2020
For primes \(p \equiv 3 \bmod 4\), we show that setting up CSIDH on the surface, i.e., using supersingular elliptic curves with endomorphism ring \(\mathbf {Z}[(1 + \sqrt{-p})/2]\), amounts to just a few sign switches in the underlying arithmetic. If \(p \equiv 7 \bmod 8\) then horizontal 2-isogenies can be used to help compute the class group action ...
W. Castryck, Thomas Decru
semanticscholar   +6 more sources

Stronger and Faster Side-Channel Protections for CSIDH [PDF]

open access: yesIACR Cryptology ePrint Archive, 2019
CSIDH is a recent quantum-resistant primitive based on the difficulty of finding isogeny paths between supersingular curves. Recently, two constant-time versions of CSIDH have been proposed: first by Meyer, Campos and Reith, and then by Onuki, Aikawa ...
Daniel Cervantes-Vázquez   +5 more
semanticscholar   +8 more sources

How to Construct CSIDH on Edwards Curves [PDF]

open access: yesFinite Fields and Their Applications, 2020
Isogeny-based cryptography relies on the complexity of the Isogeny Problem, which involves computing isogenies between elliptic curves. This cryptographic branch is a promising candidate for post-quantum cryptography. \textit{D. Jao} and \textit{L. De Feo} [Lect. Notes Comput. Sci.
Tomoki Moriya   +2 more
core   +4 more sources

Disorientation faults in CSIDH

open access: yesIACR Cryptology ePrint Archive, 2022
. We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic group actions. Our disorientation attacks effectively flip the direction of some isogeny steps. We achieve this by faulting a specific subroutine, connected
Gustavo Banegas   +7 more
semanticscholar   +4 more sources

On the Performance Analysis for CSIDH-Based Cryptosystems [PDF]

open access: yesApplied Sciences, 2020
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo   +3 more
doaj   +2 more sources

Optimized CSIDH Implementation Using a 2-Torsion Point [PDF]

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +2 more sources

Optimizations and Practicality of High-Security CSIDH [PDF]

open access: yesIACR Communications in Cryptology
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quantum security ...
Fabio Campos   +7 more
semanticscholar   +2 more sources

Optimal strategies for CSIDH

open access: yesAdvances in Mathematics of Communications, 2020
. Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) has spurred considerable attention to improving its performance and re-evaluating its classical and quantum security guarantees.
Jesús-Javier Chi-Domínguez   +1 more
semanticscholar   +4 more sources

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents [PDF]

open access: yesJournal of Cryptographic Engineering, 2021
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly reduced the estimated quantum security of the isogeny-based commutative group action key-exchange protocol CSIDH.
Jorge Chávez-Saab   +3 more
semanticscholar   +4 more sources

Home - About - Disclaimer - Privacy