Results 21 to 30 of about 1,022 (119)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies [PDF]

open access: yesIACR Cryptology ePrint Archive, 2019
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and the ...
D. Bernstein   +3 more
semanticscholar   +4 more sources

Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques

open access: yesProceedings of the 2024 Workshop on Attacks and Solutions in Hardware Security
Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) is an isogeny-based key exchange protocol which is believed to be se- cure even when parties use long-lived secret keys.
Tinghung Chiu   +2 more
semanticscholar   +2 more sources

Efficient Commutative PQC Algorithms on Isogenies of Edwards Curves [PDF]

open access: yesCryptography
The article presents the author’s works in the field of modifications and modeling of the Post-Quantum Cryptography (PQC) Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) algorithm on non-cyclic supersingular Edwards curves and its predecessor ...
Anatoly Bessalov   +2 more
doaj   +3 more sources

New proof systems and an OPRF from CSIDH

open access: yesIACR Cryptology ePrint Archive, 2023
sponsorship: The authors would like to thank Karim Baghery, Steven Galbraith, Yi-Fu Lai, Emmanuela Orsini, Nigel Smart and Frederik Vercauteren for helpful discussions regarding the contents of this work. This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme ...
Cyprien Delpech de Saint Guilhem   +1 more
semanticscholar   +4 more sources

dCTIDH: Fast & Deterministic CTIDH [PDF]

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
This paper presents dCTIDH, a CSIDH implementation that combines two recent developments into a novel state-of-the-art deterministic implementation. We combine the approach of deterministic variants of CSIDH with the batching strategy of CTIDH, which ...
Fabio Campos   +3 more
doaj   +3 more sources

A Review of Mathematical and Computational Aspects of CSIDH Algorithms

open access: yesJournal of Algebra and Its Applications, 2023
CSIDH is a post-quantum key-exchange scheme based on the action of ideal class groups on supersingular elliptic curves over prime fields. Its short keys and ciphertexts, together with its flexibility as a building block to construct complex cryptographic primitives, has motivated significant research on the efficiency of CSIDH and its resistance ...
Luciano Maino   +2 more
semanticscholar   +3 more sources

SCALLOP:Scaling the CSI-FiSh [PDF]

open access: yes, 2023
International audienceWe present SCALLOP: SCALable isogeny action based on Oriented supersingular curves with Prime conductor, a new group action based on isogenies of supersingular curves.
De Feo, Luca   +6 more
core   +1 more source

Optimised quantum-resistant signature protocol for Bitcoin using CSIDH

open access: yesInternational Journal of Blockchains and Cryptocurrencies
Siham Ezzouak, M. E. Baraka
semanticscholar   +2 more sources

Trouble at the CSIDH: Protecting CSIDH with Dummy-Operations Against Fault Injection Attacks

open access: yes2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 2020
The isogeny-based scheme CSIDH is a promising candidate for quantum-resistant static-static key exchanges with very small public keys, but is inherently difficult to implement in constant time. In the current literature, there are two directions for constant-time implementations: algorithms containing dummy computations and dummy-free algorithms. While
Campos, Fabio   +4 more
openaire   +2 more sources

From Lattice Crypto to Lættis Krypto: Various Approaches to Post-Quantum Key Exchange [PDF]

open access: yes, 2023
Key exchange is a cryptographic mechanism: it enables two or more parties to agree upon a shared key that is known only to them, even in the presence of an adversary that has access to all communication between the parties. In postquantum key exchange we
de Kock, Bastiaan Borgert
core   +1 more source

Home - About - Disclaimer - Privacy