Results 11 to 20 of about 312 (116)
Complete Analysis of Implementing Isogeny-based Cryptography using Huff Form of Elliptic Curves [PDF]
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.
Suhri Kim
core +1 more source
Hidden Stabilizers, the Isogeny To Endomorphism Ring Problem and the Cryptanalysis of pSIDH [PDF]
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codomain of an isogeny between supersingular curves in characteristic $p$ given only a representation for this isogeny, i.e.
Chen, Mingjie +5 more
core +2 more sources
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies [PDF]
An oblivious pseudorandom function, or OPRF, is an important primitive that is used to build many advanced cryptographic protocols. Despite its relevance, very few post-quantum solutions exist. In this work, we propose a novel OPRF protocol that is post-
Andrea Basso
core
Management of Pesticides from Vineyard to Wines: Focus on Wine Safety and Pesticides Removal by Emerging Technologies [PDF]
Grapevine (Vitis vinifera L.) represent an important crop, being cultivated in 2018 on 7.4 million hectares worldwide, and with a total production of 77.8 million tonnes. Grapes are susceptible to a large number of fungal pests and insects that may cause
Cotea, Valeriu V. +2 more
core +2 more sources
POKEx: Performance Analysis of POKÉ-Key Exchange and SIDH-Variants
In this paper, we present a comparative performance analysis of the POKÉ-based key exchange and SIDH variants. SIDH gained attention for its small key size and efficient performance, and has been selected as an alternate candidate in NIST PQC ...
Hyeonhak Kim, Suhri Kim
doaj +1 more source
New proof systems and an OPRF from CSIDH [PDF]
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH enough flexibility to allow the creation of many cryptographic primitives ...
Cyprien Delpech de Saint Guilhem +1 more
core
Exploring SIDH-based Signature Parameters [PDF]
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves $E$ and $E\u27$. This problem is closely related to that of computing the endomorphism
Abel Laval +6 more
core
Two Remarks on Torsion-Point Attacks in Isogeny-Based Cryptography [PDF]
We fix an omission in [Petit17] on torsion point attacks of isogeny-based cryptosystems akin to SIDH, also reprised in [dQuehen-etal21]. In these works, their authors represent certain integers using a norm equation to derive a secret isogeny.
Francesco Sica
core
A Tightly Secure Identity-based Signature Scheme from Isogenies [PDF]
We present a tightly secure identity-based signature (IBS) scheme based on the supersingular isogeny problems. Although Shaw and Dutta proposed an isogeny-based IBS scheme with provable security, the security reduction is non-tight.
Hyungrok Jo, Junji Shikata, Shingo Sato
core
An efficient key recovery attack on SIDH [PDF]
We present an efficient key recovery attack on the Supersingular Isogeny Diffie-Hellman protocol (SIDH). The attack is based on Kani\u27s reducibility criterion for isogenies from products of elliptic curves and strongly relies on the torsion point ...
Thomas Decru, Wouter Castryck
core

