An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

[PDF][PDF] An efficient key recovery attack on SIDH (preliminary version).

W Castryck, T Decru - IACR Cryptol. ePrint Arch., 2022 - esat.kuleuven.be
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …

[图书][B] Quaternion algebras

J Voight - 2021 - library.oapen.org
This open access textbook presents a comprehensive treatment of the arithmetic theory of
quaternion algebras and orders, a subject with applications in diverse areas of mathematics …

CSIDH: an efficient post-quantum commutative group action

W Castryck, T Lange, C Martindale, L Panny… - Advances in Cryptology …, 2018 - Springer
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …

FESTA: fast encryption from supersingular torsion attacks

A Basso, L Maino, G Pope - International Conference on the Theory and …, 2023 - Springer
We introduce FESTA, an efficient isogeny-based public-key encryption (PKE) protocol based
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …

Information security in the post quantum era for 5G and beyond networks: Threats to existing cryptography, and post-quantum cryptography

V Chamola, A Jolfaei, V Chanana, P Parashari… - Computer …, 2021 - Elsevier
Quantum computing is an emerging field that uses the concepts of quantum mechanics to
outperform classical computers. Quantum computing finds plethora of applications in the 5G …

Oblivious pseudorandom functions from isogenies

D Boneh, D Kogan, K Woo - … 2020: 26th International Conference on the …, 2020 - Springer
An oblivious PRF, or OPRF, is a protocol between a client and a server, where the server
has a key k for a secure pseudorandom function F, and the client has an input x for the …

Quantum security analysis of CSIDH

X Bonnetain, A Schrottenloher - … on the Theory and Applications of …, 2020 - Springer
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on
supersingular elliptic curve isogenies. It is similar in design to a previous scheme by …

Delay encryption

J Burdges, L De Feo - Annual International Conference on the Theory and …, 2021 - Springer
We introduce a new primitive named Delay Encryption, and give an efficient instantiation
based on isogenies of supersingular curves and pairings. Delay Encryption is related to …

SIDH proof of knowledge

L De Feo, S Dobson, SD Galbraith… - … Conference on the Theory …, 2022 - Springer
We show that the soundness proof for the De Feo–Jao–Plût identification scheme (the basis
for supersingular isogeny Diffie–Hellman (SIDH) signatures) contains an invalid assumption …