Results 11 to 20 of about 2,168 (195)

Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves

open access: goldIEEE Access, 2021
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.
Suhri Kim
doaj   +5 more sources

Review of Chosen Isogeny-Based Cryptographic Schemes [PDF]

open access: goldCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +4 more sources

A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography

open access: closedIEEE Transactions on Computers, 2018
In this work, we present a high-performance and scalable architecture for isogeny-based cryptosystems. In particular, we use the architecture in a fast, constant-time FPGA implementation of the quantum-resistant supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol.
Brian Koziel   +2 more
exaly   +4 more sources

Practical isogeny-based cryptography [PDF]

open access: green, 2021
This thesis aims at providing efficient and side-channel protected implementations of isogeny-based primitives, and at their application in threshold protocols. It is based on a sequence of academic papers. Chapter 3 reviews the original variable-time implementation of CSIDH and introduces several optimizations, e.g.
Michaël Meyer
openalex   +3 more sources

Mathematics of Isogeny Based Cryptography [PDF]

open access: green, 2017
These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thi s, Senegal. They try to provide a guide for Masters' students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography.
Luca De Feo
  +5 more sources

Torsion point attacks on ‘SIDH‐like’ cryptosystems

open access: yesIET Information Security, 2023
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj   +2 more sources

Verifiable Delay Function and Its Blockchain-Related Application: A Survey [PDF]

open access: yesSensors, 2022
The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random ...
Qiang Wu   +5 more
doaj   +2 more sources

Supersingular Isogeny-based Cryptography: A Survey

open access: diamondInterdisciplinary Information Sciences, 2020
Summary: With the advent of quantum computers that showed the viability of Shor's Algorithm to factor integers, it became apparent that asymmetric cryptographic algorithms might soon become insecure. Since then, a large number of new algorithms that are conjectured to be quantum-secure have been proposed, many of which come with non-negligible trade ...
Philipp STRATIL   +2 more
openalex   +4 more sources

Arithmetic Considerations for Isogeny-Based Cryptography [PDF]

open access: greenIEEE Transactions on Computers, 2018
In this paper we investigate various arithmetic techniques which can be used to potentially enhance the performance in the supersingular isogeny Diffie-Hellman (SIDH) key-exchange protocol which is one of the more recent contenders in the post-quantum public-key arena.
Joppe W. Bos, Simon Friedberger
openalex   +3 more sources

Home - About - Disclaimer - Privacy