Results 1 to 10 of about 5,615 (205)

Structural basis for the toxicity of Legionella pneumophila effector SidH [PDF]

open access: yesNature Communications, 2023
Legionella pneumophila (LP) secretes more than 300 effectors into the host cytosol to facilitate intracellular replication. One of these effectors, SidH, 253 kDa in size with no sequence similarity to proteins of known function is toxic when ...
Rahul Sharma   +2 more
exaly   +6 more sources

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes-Vázquez   +2 more
exaly   +3 more sources

New Techniques for SIDH-based NIKE

open access: yesJournal of Mathematical Cryptology, 2020
We consider the problem of producing an efficient, practical, quantum-resistant non-interactive key exchange (NIKE) protocol based on Supersingular Isogeny Diffie-Hellman (SIDH).
David Urbanik, David Jao
exaly   +3 more sources

Torsion point attacks on ‘SIDH‐like’ cryptosystems

open access: yesIET Information Security, 2023
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj   +4 more sources

Performance and Efficiency Evaluation of M-SIDH

open access: yesIEEE Access
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion ...
Suhri Kim
exaly   +4 more sources

¿Sesgos de género en el SIDH?

open access: yesBrazilian Journal of Empirical Legal Studies, 2021
El propósito de este artículo es comprender los posibles sesgos de género que pueden orientar el modus operandi del Sistema Interamericano de Derechos Humanos (SIDH) en los casos de tortura y malos tratos en las cárceles.
Teresa Fernández Paredes   +3 more
doaj   +4 more sources

High Performance Modular Multiplication for SIDH [PDF]

open access: yesIEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 2020
The latest research indicates that quantum computers will be realized in the near future. In theory, the computation speed of a quantum computer is much faster than current computers, which will pose a serious threat to current cryptosystems. Post-quantum cryptography (PQC) is a class of cryptography based on underlying mathematical problems that are ...
Weiqiang Liu, Ziying Ni
exaly   +4 more sources

A New Adaptive Attack on SIDH

open access: yesLecture Notes in Computer Science, 2022
The SIDH key exchange is the main building block of SIKE, the only isogeny based scheme involved in the NIST standardization process. In 2016, Galbraith et al. presented an adaptive attack on SIDH. In this attack, a malicious party manipulates the torsion points in his public key in order to recover an honest party’s static secret key, when having ...
Fouotsa, Tako Boris, Petit, Christophe
exaly   +2 more sources

Efficiency of SIDH-based signatures (yes, SIDH)

open access: yesJournal of Mathematical Cryptology
In this note, we assess the efficiency of a supersingular isogeny Diffie-Hellman (SIDH)-based digital signature built on a weaker variant of a recent identification protocol proposed by Basso et al.
Ghantous Wissam   +2 more
doaj   +4 more sources

A Direct Key Recovery Attack on SIDH

open access: yesLecture Notes in Computer Science, 2023
We present an attack on SIDH utilising isogenies between polarized products of two supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered independently from [8]) has subexponential complexity, thus significantly reducing the security of SIDH and SIKE. When the endomorphism ring of the starting curve is known, our
Benjamin Wesolowski
exaly   +3 more sources

Home - About - Disclaimer - Privacy