SIDH proof of knowledge
We show that the soundness proof for the De Feo–Jao–Plût identification scheme (the basis
for supersingular isogeny Diffie–Hellman (SIDH) signatures) contains an invalid assumption …
for supersingular isogeny Diffie–Hellman (SIDH) signatures) contains an invalid assumption …
Towards post-quantum security for signal's X3DH handshake
Modern key exchange protocols are usually based on the Diffie–Hellman (DH) primitive. The
beauty of this primitive, among other things, is its potential reusage of key shares: DH shares …
beauty of this primitive, among other things, is its potential reusage of key shares: DH shares …
SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
TB Fouotsa, C Petit - Advances in Cryptology–ASIACRYPT 2021: 27th …, 2021 - Springer
In 2016, Galbraith et al. presented an adaptive attack on the SIDH key exchange protocol. In
SIKE, one applies a variant of the Fujisaki-Okamoto transform to force Bob to reveal his …
SIKE, one applies a variant of the Fujisaki-Okamoto transform to force Bob to reveal his …
Torsion point attacks on 'SIDH‐like'cryptosystems
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The
best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman …
best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman …
Secret keys in genus-2 SIDH
S Kunzweiler, YB Ti, C Weitkämper - International Conference on Selected …, 2021 - Springer
We present a polynomial-time adaptive attack on the genus-2 variant of SIDH (G2SIDH) and
describe an improvement to its secret selection procedure. G2SIDH is a generalisation of the …
describe an improvement to its secret selection procedure. G2SIDH is a generalisation of the …
A Note on constructing SIDH-pok-based signatures after castryck-decru attack
JJ Chi-Domínguez - Cryptology ePrint Archive, 2022 - eprint.iacr.org
In spite of the wave of devastating attacks on SIDH, started by Castryck-Decru (Eurocrypt
2023), there is still interest in constructing quantum secure SIDH Proofs of Knowledge …
2023), there is still interest in constructing quantum secure SIDH Proofs of Knowledge …
[PDF][PDF] A curved path to post-quantum: cryptanalysis and design of isogeny-based cryptography
SP Merz - 2023 - core.ac.uk
This thesis presents multiple results concerning the cryptanalysis and design of
isogenybased primitives and advanced protocols which aim to provide security in the …
isogenybased primitives and advanced protocols which aim to provide security in the …
Design and analysis of isogeny-based static-key protocols
A Basso - 2024 - etheses.bham.ac.uk
The advent of quantum computers renders most cryptographic protocols obsolete and urges
for a quick transition to post-quantum solutions. Many valid techniques for quantum-secure …
for a quick transition to post-quantum solutions. Many valid techniques for quantum-secure …
Cryptanalysis of Isogeny-based Protocols in Genus 1 and 2
C Weitkämper - 2023 - etheses.bham.ac.uk
Isogeny-based cryptography is one of the contenders for providing cryptosystems based on
mathematical problems which are assumed to be hard for both classical and quantum …
mathematical problems which are assumed to be hard for both classical and quantum …
Security analysis of isogeny-based cryptosystems
C Leonardi - 2020 - uwspace.uwaterloo.ca
Let $ E $ be a supersingular elliptic curve over a finite field. In this document we study public-
key encryption schemes which use non-constant rational maps from $ E $. The purpose of …
key encryption schemes which use non-constant rational maps from $ E $. The purpose of …