Cryptographic group actions and applications

N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …

SeaSign: compact isogeny signatures from class group actions

L De Feo, SD Galbraith - … in Cryptology–EUROCRYPT 2019: 38th Annual …, 2019 - Springer
We give a new signature scheme for isogenies that combines the class group actions of
CSIDH with the notion of Fiat-Shamir with aborts. Our techniques allow to have signatures of …

Post-quantum TLS without handshake signatures

P Schwabe, D Stebila, T Wiggers - Proceedings of the 2020 ACM …, 2020 - dl.acm.org
We present KEMTLS, an alternative to the TLS 1.3 handshake that uses key-encapsulation
mechanisms (KEMs) instead of signatures for server authentication. Among existing post …

He gives C-sieves on the CSIDH

C Peikert - Annual international conference on the theory and …, 2020 - Springer
Abstract Recently, Castryck, Lange, Martindale, Panny, and Renes proposed CSIDH
(pronounced “sea-side”) as a candidate post-quantum “commutative group action.” It has …

Verifiable delay functions from supersingular isogenies and pairings

L De Feo, S Masson, C Petit, A Sanso - … on the Theory and Application of …, 2019 - Springer
We present two new Verifiable Delay Functions (VDF) based on assumptions from elliptic
curve cryptography. We discuss both the advantages and drawbacks of our constructions …

B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion

C Costello - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
This paper explores a new way of instantiating isogeny-based cryptography in which parties
can work in both the (p+ 1)(p+ 1)-torsion of a set of supersingular curves and in the (p-1)(p …

Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

Quantum security analysis of CSIDH

X Bonnetain, A Schrottenloher - … on the Theory and Applications of …, 2020 - Springer
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on
supersingular elliptic curve isogenies. It is similar in design to a previous scheme by …

: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist

S Katsumata, YF Lai, JT LeGrow, L Qin - Annual International Cryptology …, 2023 - Springer
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature
scheme. While at a high level the scheme resembles the Schnorr blind signature, our work …

A faster way to the CSIDH

M Meyer, S Reith - Progress in Cryptology–INDOCRYPT 2018: 19th …, 2018 - Springer
Abstract Recently Castryck, Lange, Martindale, Panny, and Renes published CSIDH, a new
key exchange scheme using supersingular elliptic curve isogenies. Due to its small key …