M-SIDH and MD-SIDH: countering SIDH attacks by masking information

TB Fouotsa, T Moriya, C Petit - … on the Theory and Applications of …, 2023 - Springer
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …

New SIDH countermeasures for a more efficient key exchange

A Basso, TB Fouotsa - International Conference on the Theory and …, 2023 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …

An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

[PDF][PDF] An efficient key recovery attack on SIDH (preliminary version).

W Castryck, T Decru - IACR Cryptol. ePrint Arch., 2022 - esat.kuleuven.be
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …

Optimal strategies for CSIDH

JJ Chi-Domínguez… - Cryptology ePrint Archive, 2020 - eprint.iacr.org
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol
(CSIDH) has spurred considerable attention to improving its performance and re-evaluating …

Efficient algorithms for supersingular isogeny Diffie-Hellman

C Costello, P Longa, M Naehrig - … , Santa Barbara, CA, USA, August 14-18 …, 2016 - Springer
We propose a new suite of algorithms that significantly improve the performance of
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …

Improved torsion-point attacks on SIDH variants

V de Quehen, P Kutas, C Leonardi… - Advances in Cryptology …, 2021 - Springer
SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding
isogenies between supersingular elliptic curves. However, SIDH and related cryptosystems …

(Short Paper) a faster constant-time algorithm of CSIDH keeping two points

H Onuki, Y Aikawa, T Yamazaki, T Takagi - Advances in Information and …, 2019 - Springer
Abstract At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed
CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a …

A faster software implementation of the supersingular isogeny Diffie-Hellman key exchange protocol

A Faz-Hernández, J López… - IEEE Transactions …, 2017 - ieeexplore.ieee.org
Since its introduction by Jao and De Feo in 2011, the supersingular isogeny Diffie-Hellman
(SIDH) key exchange protocol has positioned itself as a promising candidate for post …

A simple and compact algorithm for SIDH with arbitrary degree isogenies

C Costello, H Hisil - Advances in Cryptology–ASIACRYPT 2017: 23rd …, 2017 - Springer
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic
curves in Montgomery form. The formula lends itself to a simple and compact algorithm that …