Breaking SIDH in polynomial time

D Robert - Annual International Conference on the Theory and …, 2023 - Springer
Breaking SIDH in Polynomial Time | SpringerLink Skip to main content Advertisement
SpringerLink Account Menu Find a journal Publish with us Track your research Search Cart …

M-SIDH and MD-SIDH: countering SIDH attacks by masking information

TB Fouotsa, T Moriya, C Petit - … on the Theory and Applications of …, 2023 - Springer
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …

Post-quantum zero-knowledge and signatures from symmetric-key primitives

M Chase, D Derler, S Goldfeder, C Orlandi… - Proceedings of the …, 2017 - dl.acm.org
We propose a new class of post-quantum digital signature schemes that:(a) derive their
security entirely from the security of symmetric-key primitives, believed to be quantum …

SQISignHD: new dimensions in cryptography

P Dartois, A Leroux, D Robert, B Wesolowski - … Conference on the Theory …, 2024 - Springer
We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by
SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on …

Supersingular curves you can trust

A Basso, G Codogni, D Connolly, L De Feo… - … Conference on the …, 2023 - Springer
Generating a supersingular elliptic curve such that nobody knows its endomorphism ring is a
notoriously hard task, despite several isogeny-based protocols relying on such an object. A …

The supersingular isogeny path and endomorphism ring problems are equivalent

B Wesolowski - 2021 IEEE 62nd Annual Symposium on …, 2022 - ieeexplore.ieee.org
We prove that the path-finding problem in isogeny graphs and the endomorphism ring
problem for supersingular elliptic curves are equivalent under reductions of polynomial …

A post-quantum digital signature scheme based on supersingular isogenies

Y Yoo, R Azarderakhsh, A Jalali, D Jao… - … Cryptography and Data …, 2017 - Springer
We present the first general-purpose digital signature scheme based on supersingular
elliptic curve isogenies secure against quantum adversaries in the quantum random oracle …

Identification protocols and signature schemes based on supersingular isogeny problems

SD Galbraith, C Petit, J Silva - … 2017: 23rd International Conference on the …, 2017 - Springer
We provide a new identification protocol and new signature schemes based on isogeny
problems. Our identification protocol relies on the hardness of the endomorphism ring …

Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

Oblivious pseudorandom functions from isogenies

D Boneh, D Kogan, K Woo - … 2020: 26th International Conference on the …, 2020 - Springer
An oblivious PRF, or OPRF, is a protocol between a client and a server, where the server
has a key k for a secure pseudorandom function F, and the client has an input x for the …