Results 1 to 10 of about 5,615 (205)
Structural basis for the toxicity of Legionella pneumophila effector SidH [PDF]
Legionella pneumophila (LP) secretes more than 300 effectors into the host cytosol to facilitate intracellular replication. One of these effectors, SidH, 253 kDa in size with no sequence similarity to proteins of known function is toxic when ...
Rahul Sharma +2 more
exaly +6 more sources
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes-Vázquez +2 more
exaly +3 more sources
New Techniques for SIDH-based NIKE
We consider the problem of producing an efficient, practical, quantum-resistant non-interactive key exchange (NIKE) protocol based on Supersingular Isogeny Diffie-Hellman (SIDH).
David Urbanik, David Jao
exaly +3 more sources
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj +4 more sources
Performance and Efficiency Evaluation of M-SIDH
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
exaly +4 more sources
El propósito de este artículo es comprender los posibles sesgos de género que pueden orientar el modus operandi del Sistema Interamericano de Derechos Humanos (SIDH) en los casos de tortura y malos tratos en las cárceles.
Teresa Fernández Paredes +3 more
doaj +4 more sources
High Performance Modular Multiplication for SIDH [PDF]
The latest research indicates that quantum computers will be realized in the near future. In theory, the computation speed of a quantum computer is much faster than current computers, which will pose a serious threat to current cryptosystems. Post-quantum cryptography (PQC) is a class of cryptography based on underlying mathematical problems that are ...
Weiqiang Liu, Ziying Ni
exaly +4 more sources
The SIDH key exchange is the main building block of SIKE, the only isogeny based scheme involved in the NIST standardization process. In 2016, Galbraith et al. presented an adaptive attack on SIDH. In this attack, a malicious party manipulates the torsion points in his public key in order to recover an honest party’s static secret key, when having ...
Fouotsa, Tako Boris, Petit, Christophe
exaly +2 more sources
Efficiency of SIDH-based signatures (yes, SIDH)
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam +2 more
doaj +4 more sources
A Direct Key Recovery Attack on SIDH
We present an attack on SIDH utilising isogenies between polarized products of two supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered independently from [8]) has subexponential complexity, thus significantly reducing the security of SIDH and SIKE. When the endomorphism ring of the starting curve is known, our
Benjamin Wesolowski
exaly +3 more sources

