Results 21 to 30 of about 1,022 (119)
Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies [PDF]
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and the ...
D. Bernstein +3 more
semanticscholar +4 more sources
Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) is an isogeny-based key exchange protocol which is believed to be se- cure even when parties use long-lived secret keys.
Tinghung Chiu +2 more
semanticscholar +2 more sources
Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves [PDF]
The article presents the author’s works in the field of modifications and modeling of the Post-Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm on non-cyclic supersingular Edwards curves and its predecessor ...
Anatoly Bessalov +2 more
doaj +3 more sources
New proof systems and an OPRF from CSIDH
sponsorship: The authors would like to thank Karim Baghery, Steven Galbraith, Yi-Fu Lai, Emmanuela Orsini, Nigel Smart and Frederik Vercauteren for helpful discussions regarding the contents of this work. This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme ...
Cyprien Delpech de Saint Guilhem +1 more
semanticscholar +4 more sources
dCTIDH: Fast & Deterministic CTIDH [PDF]
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos +3 more
doaj +3 more sources
A Review of Mathematical and Computational Aspects of CSIDH Algorithms
CSIDH is a post-quantum key-exchange scheme based on the action of ideal class groups on supersingular elliptic curves over prime fields. Its short keys and ciphertexts, together with its flexibility as a building block to construct complex cryptographic primitives, has motivated significant research on the efficiency of CSIDH and its resistance ...
Luciano Maino +2 more
semanticscholar +3 more sources
SCALLOP:Scaling the CSI-FiSh [PDF]
International audienceWe present SCALLOP: SCALable isogeny action based on Oriented supersingular curves with Prime conductor, a new group action based on isogenies of supersingular curves.
De Feo, Luca +6 more
core +1 more source
Optimised quantum-resistant signature protocol for Bitcoin using CSIDH
Siham Ezzouak, M. E. Baraka
semanticscholar +2 more sources
Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-static key exchanges with very small public keys, but is inherently difficult to implement in constant time. In the current literature, there are two directions for constant-time implementations: algorithms containing dummy computations and dummy-free algorithms. While
Campos, Fabio +4 more
openaire +2 more sources
From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange [PDF]
Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. In postquantum key exchange we
de Kock, Bastiaan Borgert
core +1 more source

