Isogeny-based key establishment protocols are believed to be resistant to quantum cryptanalysis. Two such protocols—supersingular isogeny Diffie-Hellman (SIDH) and …
The interest in realizing generic PQC KEM-based PAKEs has increased significantly in the last few years. One such PAKE is the CAKE protocol, proposed by Beguinet et al.(ACNS'23) …
Abstract We revisit OCAKE (ACNS 23), a generic recipe that constructs password-based authenticated key exchange (PAKE) from key encapsulation mechanisms (KEMs), to allow …
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, eg, to suppress brute-force attacks …
P Jana, R Dutta - International Conference on Cryptology in India, 2024 - Springer
Passwords are commonly used for authentication, but their susceptibility to brute force and dictionary attacks poses a significant risk. To mitigate this issue, Password Authenticated …
M Qi, J Chen - The Journal of Supercomputing, 2022 - Springer
This paper presents a provably secure post-quantum authentication and key establishment protocol for mobile environments, which is the first one from supersingular isogeny to our …
R Ishibashi, K Yoneyama - Australasian Conference on Information …, 2023 - Springer
At ASIACRYPT 2020, Alamati et al. formalized the framework of group actions for abstracting isogeny-based cryptosystems. At CRYPTO 2022, Abdalla et al. extended the framework to …
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, eg, to suppress brute-force attacks …