Results 1 to 10 of about 312 (116)

A Polynomial Time Attack on Instances of M-SIDH and FESTA [PDF]

open access: yesLecture Notes in Computer Science, 2023
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT - No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203. Date of this document: 9th November 2023. (European Research Council (ERC) under
Wouter Castryck, Frederik Vercauteren
exaly   +5 more sources

M-SIDH and MD-SIDH: Countering SIDH Attacks by Masking Information [PDF]

open access: yesLecture Notes in Computer Science, 2023
The SIDH protocol is an isogeny-based key exchange protocol using supersingular isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm which advanced to the fourth round of NIST\u27s post-quantum standardization project
Tako Boris Fouotsa   +2 more
exaly   +4 more sources

Performance and Efficiency Evaluation of M-SIDH

open access: yesIEEE Access
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
exaly   +4 more sources

Pairing Optimizations for Isogeny-Based Cryptosystems [PDF]

open access: yesIET Information Security
In isogeny-based cryptography, bilinear pairings are regarded as a powerful tool in various applications, including key compression, public key validation, and torsion basis generation. However, in most isogeny-based protocols, the performance of pairing
Shiping Cai, Kaizhan Lin, Chang-An Zhao
doaj   +2 more sources

Structural basis for the toxicity of Legionella pneumophila effector SidH [PDF]

open access: yesNature Communications, 2023
Rahul Sharma   +2 more
exaly   +2 more sources

Public-key Compression in M-SIDH [PDF]

open access: yes, 2023
Recently, SIKE was broken by the Castryck-Decru attack in polynomial time. To avoid this attack, Fouotsa et al. proposed a SIDH-like scheme called M-SIDH, which hides the information of auxiliary points.
Chang-An Zhao   +4 more
core  

Fast Large Integer Modular Addition in GF(p) Using Novel Attribute-Based Representation

open access: yesIEEE Access, 2019
Addition is an essential operation in all cryptographic algorithms. Higher levels of security require larger key sizes and this becomes a limiting factor in GF(p) using large integers because of the carry propagation problem.
Bader Alhazmi, Fayez Gebali
doaj   +1 more source

New SIDH Countermeasures for a More Efficient Key Exchange [PDF]

open access: yes, 2023
The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a polynomial-time key-recovery attack.
Andrea Basso, Tako Boris Fouotsa
core  

SIDH with masked torsion point images [PDF]

open access: yes, 2023
We propose a countermeasure to the Castryck-Decru attack on SIDH. The attack heavily relies on the images of torsion points. The main input to our countermeasure consists in masking the torsion point images in SIDH in a way they are not exploitable in ...
Tako Boris Fouotsa
core  

IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram [PDF]

open access: yes, 2023
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. One of the benefits of using isogeny-based cryptography is its compactness.
Tomoki Moriya
core  

Home - About - Disclaimer - Privacy