Results 1 to 10 of about 312 (116)
A Polynomial Time Attack on Instances of M-SIDH and FESTA [PDF]
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT - No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203. Date of this document: 9th November 2023. (European Research Council (ERC) under
Wouter Castryck, Frederik Vercauteren
exaly +5 more sources
M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information [PDF]
The SIDH protocol is an isogeny-based key exchange protocol using supersingular isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm which advanced to the fourth round of NIST\u27s post-quantum standardization project
Tako Boris Fouotsa +2 more
exaly +4 more sources
Performance and Efficiency Evaluation of M-SIDH
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
exaly +4 more sources
Pairing Optimizations for Isogeny-Based Cryptosystems [PDF]
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj +2 more sources
Structural basis for the toxicity of Legionella pneumophila effector SidH [PDF]
Rahul Sharma +2 more
exaly +2 more sources
Public-key Compression in M-SIDH [PDF]
Recently, SIKE was broken by the Castryck-Decru attack in polynomial time. To avoid this attack, Fouotsa et al. proposed a SIDH-like scheme called M-SIDH, which hides the information of auxiliary points.
Chang-An Zhao +4 more
core
Fast Large Integer Modular Addition in GF(p) Using Novel Attribute-Based Representation
Addition is an essential operation in all cryptographic algorithms. Higher levels of security require larger key sizes and this becomes a limiting factor in GF(p) using large integers because of the carry propagation problem.
Bader Alhazmi, Fayez Gebali
doaj +1 more source
New SIDH Countermeasures for a More Efficient Key Exchange [PDF]
The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack.
Andrea Basso, Tako Boris Fouotsa
core
SIDH with masked torsion point images [PDF]
We propose a countermeasure to the Castryck-Decru attack on SIDH. The attack heavily relies on the images of torsion points. The main input to our countermeasure consists in masking the torsion point images in SIDH in a way they are not exploitable in ...
Tako Boris Fouotsa
core
IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram [PDF]
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. One of the benefits of using isogeny-based cryptography is its compactness.
Tomoki Moriya
core

