Results 11 to 20 of about 1,022 (119)
Quantum Security Analysis of CSIDH [PDF]
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on supersingular elliptic curve isogenies. It is similar in design to a previous scheme by Couveignes, Rostovtsev and Stolbunov, but aims at an improved balance between ...
X. Bonnetain, A. Schrottenloher
semanticscholar +8 more sources
For primes \(p \equiv 3 \bmod 4\), we show that setting up CSIDH on the surface, i.e., using supersingular elliptic curves with endomorphism ring \(\mathbf {Z}[(1 + \sqrt{-p})/2]\), amounts to just a few sign switches in the underlying arithmetic. If \(p \equiv 7 \bmod 8\) then horizontal 2-isogenies can be used to help compute the class group action ...
W. Castryck, Thomas Decru
semanticscholar +6 more sources
Stronger and Faster Side-Channel Protections for CSIDH [PDF]
CSIDH is a recent quantum-resistant primitive based on the difficulty of finding isogeny paths between supersingular curves. Recently, two constant-time versions of CSIDH have been proposed: first by Meyer, Campos and Reith, and then by Onuki, Aikawa ...
Daniel Cervantes-Vázquez +5 more
semanticscholar +8 more sources
How to Construct CSIDH on Edwards Curves [PDF]
Isogeny-based cryptography relies on the complexity of the Isogeny Problem, which involves computing isogenies between elliptic curves. This cryptographic branch is a promising candidate for post-quantum cryptography. \textit{D. Jao} and \textit{L. De Feo} [Lect. Notes Comput. Sci.
Tomoki Moriya +2 more
core +4 more sources
Disorientation faults in CSIDH
. We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic group actions. Our disorientation attacks effectively flip the direction of some isogeny steps. We achieve this by faulting a specific subroutine, connected
Gustavo Banegas +7 more
semanticscholar +4 more sources
On the Performance Analysis for CSIDH-Based Cryptosystems [PDF]
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo +3 more
doaj +2 more sources
Optimized CSIDH Implementation Using a 2-Torsion Point [PDF]
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo +4 more
doaj +2 more sources
Optimizations and Practicality of High-Security CSIDH [PDF]
In this work, we assess the real-world practicality of CSIDH, an isogeny-based non-interactive key exchange. We provide the first thorough assessment of the practicality of CSIDH in higher parameter sizes for conservative estimates of quantum security ...
Fabio Campos +7 more
semanticscholar +2 more sources
. Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) has spurred considerable attention to improving its performance and re-evaluating its classical and quantum security guarantees.
Jesús-Javier Chi-Domínguez +1 more
semanticscholar +4 more sources
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents [PDF]
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly reduced the estimated quantum security of the isogeny-based commutative group action key-exchange protocol CSIDH.
Jorge Chávez-Saab +3 more
semanticscholar +4 more sources

