FESTA: fast encryption from supersingular torsion attacks

A Basso, L Maino, G Pope - International Conference on the Theory and …, 2023 - Springer
We introduce FESTA, an efficient isogeny-based public-key encryption (PKE) protocol based
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …

SCALLOP-HD: group action from 2-dimensional isogenies

M Chen, A Leroux, L Panny - IACR International Conference on Public …, 2024 - Springer
We present SCALLOP-HD, a novel group action that builds upon the recent SCALLOP
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …

Isogeny problems with level structure

L De Feo, TB Fouotsa, L Panny - … on the Theory and Applications of …, 2024 - Springer
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …

Exploring SIDH-based signature parameters

A Basso, M Chen, TB Fouotsa, P Kutas, A Laval… - … Conference on Applied …, 2024 - Springer
Isogeny-based cryptography is an instance of post-quantum cryptography whose
fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves …

POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies

A Basso - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We introduce a new framework, POKE, to build cryptographic protocols from irrational
isogenies using higher-dimensional representations. The framework enables two parties to …

Random Walks in Number-theoretic Cryptology

B Wesolowski - 2024 - hal.science
Random Walks in Number-theoretic Cryptology Page 1 HAL Id: tel-04837478 https://hal.science/tel-04837478v1
Submitted on 13 Dec 2024 HAL is a multi-disciplinary open access archive for the deposit …

PEARL-SCALLOP: Parameter Extension Applicable in Real Life for SCALLOP

B Allombert, JF Biasse, JK Eriksen, P Kutas… - 2024 - inria.hal.science
A crucial ingredient for many cryptographic primitives such as key exchange protocols and
advanced signature schemes is a commutative group action where the structure of the …

[图书][B] Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part …

C Pöpper - 2024 - books.google.com
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International
Conference on Applied Cryptography and Network Security, ACNS 2024, which took place …

[PDF][PDF] The Hidden Subgroup Problem and Quantum Cryptanalysis

M Imran - repozitorium.omikk.bme.hu
In this thesis, we consider the hidden subgroup problem (HSP). Let G be a finite group, and
suppose we are given a function f on G such that f is constant and distinct on different left …