Results 31 to 40 of about 312 (116)

Optimized Constant-Time Implementation of terSIDH [PDF]

open access: yes
Since supersingular isogeny Diffie-Hellman (SIDH) was broken by a polynomial-time attack, several countermeasures were proposed. Among them, terSIDH has been highlighted for its high performance, yet it exposes a side-channel vulnerability.
Changmin Lee   +4 more
core  

Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs [PDF]

open access: yes, 2023
In this paper, we present a side-channel analysis (SCA) on key encapsulation mechanisms (KEMs) based on the Fujisaki–Okamoto (FO) transformation and its variants.
Akira Ito   +5 more
core  

Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion [PDF]

open access: yes
The polynomial attacks on SIDH by Castryck, Decru, Maino, Martindale and Robert have shown that, while the general isogeny problem is still considered unfeasible to break, it is possible to efficiently compute a secret isogeny when given its degree and ...
David Jao, Youcef Mokrani
core  

Towards Optimally Small Smoothness Bounds for Cryptographic-Sized Twin Smooth Integers and its Isogeny-based Applications [PDF]

open access: yes, 2023
We give a new approach for finding large twin smooth integers. Those twins whose sum is a prime are of interest in the parameter setup of certain isogeny-based cryptosystems such as SQISign. The approach to find such twins is to find two polynomials in $\
Bruno Sterner
core  

Deep learning-based incoherent holographic camera enabling acquisition of real-world holograms for holographic streaming system. [PDF]

open access: yesNat Commun, 2023
Yu H   +10 more
europepmc   +1 more source

INKE: Fast Isogeny-Based PKE using Intermediate Curves [PDF]

open access: yes
POKÉ (Point-Based Key Exchange), proposed by Basso and Maino in Eurocrypt 2025, is currently the fastest known isogeny-based public key encryption scheme, combining a SIDH-like protocol with higher-dimensional isogenies.
Hyeonhak Kim, Seokhie Hong, Suhri Kim
core  

New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves [PDF]

open access: yes, 2019
Along with the resistance against quantum computers, isogeny-based cryptography offers attractive cryptosystems due to small key sizes and compatibility with the current elliptic curve primitives. While the state-of-the-art implementation uses Montgomery
Jihoon Kwon   +4 more
core  

POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies [PDF]

open access: yes
We introduce a new framework, POKE, to build cryptographic protocols from irrational isogenies using higher-dimensional representations. The framework enables two parties to manipulate higher-dimensional representations of isogenies to efficiently ...
Andrea Basso
core  

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves [PDF]

open access: yes, 2019
In this paper, we present an efficient method to compute arbitrary odd-degree isogenies on Edwards curves. By using the $w$-coordinate, we optimized the isogeny formula on Edwards curves by Moody and Shumow.
Kisoon Yoon   +3 more
core  

Home - About - Disclaimer - Privacy