Practical post-quantum signature schemes from isomorphism problems of trilinear forms

G Tang, DH Duong, A Joux, T Plantard, Y Qiao… - … conference on the …, 2022 - Springer
In this paper, we propose a practical signature scheme based on the alternating trilinear
form equivalence problem. Our scheme is inspired by the Goldreich-Micali-Wigderson's zero …

Faster algorithms for isogeny problems using torsion point images

C Petit - Advances in Cryptology–ASIACRYPT 2017: 23rd …, 2017 - Springer
There is a recent trend in cryptography to construct protocols based on the hardness of
computing isogenies between supersingular elliptic curves. Two prominent examples are …

Towards a quantum-resistant weak verifiable delay function

T Decru, L Maino, A Sanso - … on Cryptology and Information Security in …, 2023 - Springer
In this paper, we present a new quantum-resistant weak Verifiable Delay Function based on
a purely algebraic construction. Its delay depends on computing a large-degree isogeny …

Identification protocols and signature schemes based on supersingular isogeny problems

SD Galbraith, C Petit, J Silva - … 2017: 23rd International Conference on the …, 2017 - Springer
We provide a new identification protocol and new signature schemes based on isogeny
problems. Our identification protocol relies on the hardness of the endomorphism ring …

Orienting supersingular isogeny graphs

L Colo, D Kohel - Journal of Mathematical Cryptology, 2020 - degruyter.com
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of
the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs. As an …

Séta: supersingular encryption from torsion attacks

L De Feo, C Delpech de Saint Guilhem… - Advances in Cryptology …, 2021 - Springer
We present Séta (To be pronounced [ʃe: tɒ] meaning “walk” in Hungarian.), a new family of
public-key encryption schemes with post-quantum security based on isogenies of …

An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

Efficient algorithms for supersingular isogeny Diffie-Hellman

C Costello, P Longa, M Naehrig - … , Santa Barbara, CA, USA, August 14-18 …, 2016 - Springer
We propose a new suite of algorithms that significantly improve the performance of
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …

Evidence that XTR is more secure than supersingular elliptic curve cryptosystems

ER Verheul - International Conference on the Theory and …, 2001 - Springer
We show that finding an efficiently computable injective homomorphism from the XTR
subgroup into the group of points over GF (p 2) of a particular type of supersingular elliptic …

Securing the Internet of Things in a quantum world

C Cheng, R Lu, A Petzoldt… - IEEE Communications …, 2017 - ieeexplore.ieee.org
Currently, we rely on cryptographic algorithms such as elliptic curve cryptosystems (ECCs)
as basic building blocks to secure the communication in the IoT. However, public key …