SIDH proof of knowledge

L De Feo, S Dobson, SD Galbraith… - … Conference on the Theory …, 2022 - Springer
We show that the soundness proof for the De Feo–Jao–Plût identification scheme (the basis
for supersingular isogeny Diffie–Hellman (SIDH) signatures) contains an invalid assumption …

Towards post-quantum security for signal's X3DH handshake

J Brendel, M Fischlin, F Günther, C Janson… - Selected Areas in …, 2021 - Springer
Modern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The
beauty of this primitive, among other things, is its potential reusage of key shares: DH shares …

SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH

TB Fouotsa, C Petit - Advances in Cryptology–ASIACRYPT 2021: 27th …, 2021 - Springer
In 2016, Galbraith et al. presented an adaptive attack on the SIDH key exchange protocol. In
SIKE, one applies a variant of the Fujisaki-Okamoto transform to force Bob to reveal his …

Torsion point attacks on 'SIDH‐like'cryptosystems

P Kutas, C Petit - IET Information Security, 2023 - Wiley Online Library
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The
best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman …

Secret keys in genus-2 SIDH

S Kunzweiler, YB Ti, C Weitkämper - International Conference on Selected …, 2021 - Springer
We present a polynomial-time adaptive attack on the genus-2 variant of SIDH (G2SIDH) and
describe an improvement to its secret selection procedure. G2SIDH is a generalisation of the …

A Note on constructing SIDH-pok-based signatures after castryck-decru attack

JJ Chi-Domínguez - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In spite of the wave of devastating attacks on SIDH, started by Castryck-Decru (Eurocrypt
2023), there is still interest in constructing quantum secure SIDH Proofs of Knowledge …

[PDF][PDF] A curved path to post-quantum: cryptanalysis and design of isogeny-based cryptography

SP Merz - 2023 - core.ac.uk
This thesis presents multiple results concerning the cryptanalysis and design of
isogenybased primitives and advanced protocols which aim to provide security in the …

Design and analysis of isogeny-based static-key protocols

A Basso - 2024 - etheses.bham.ac.uk
The advent of quantum computers renders most cryptographic protocols obsolete and urges
for a quick transition to post-quantum solutions. Many valid techniques for quantum-secure …

Cryptanalysis of Isogeny-based Protocols in Genus 1 and 2

C Weitkämper - 2023 - etheses.bham.ac.uk
Isogeny-based cryptography is one of the contenders for providing cryptosystems based on
mathematical problems which are assumed to be hard for both classical and quantum …

Security analysis of isogeny-based cryptosystems

C Leonardi - 2020 - uwspace.uwaterloo.ca
Let $ E $ be a supersingular elliptic curve over a finite field. In this document we study public-
key encryption schemes which use non-constant rational maps from $ E $. The purpose of …