FESTA: fast encryption from supersingular torsion attacks
We introduce FESTA, an efficient isogeny-based public-key encryption (PKE) protocol based
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
SCALLOP-HD: group action from 2-dimensional isogenies
We present SCALLOP-HD, a novel group action that builds upon the recent SCALLOP
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
Isogeny problems with level structure
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
Exploring SIDH-based signature parameters
Isogeny-based cryptography is an instance of post-quantum cryptography whose
fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves …
fundamental problem consists of finding an isogeny between two (isogenous) elliptic curves …
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies
A Basso - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We introduce a new framework, POKE, to build cryptographic protocols from irrational
isogenies using higher-dimensional representations. The framework enables two parties to …
isogenies using higher-dimensional representations. The framework enables two parties to …
Random Walks in Number-theoretic Cryptology
B Wesolowski - 2024 - hal.science
Random Walks in Number-theoretic Cryptology Page 1 HAL Id: tel-04837478 https://hal.science/tel-04837478v1
Submitted on 13 Dec 2024 HAL is a multi-disciplinary open access archive for the deposit …
Submitted on 13 Dec 2024 HAL is a multi-disciplinary open access archive for the deposit …
PEARL-SCALLOP: Parameter Extension Applicable in Real Life for SCALLOP
B Allombert, JF Biasse, JK Eriksen, P Kutas… - 2024 - inria.hal.science
A crucial ingredient for many cryptographic primitives such as key exchange protocols and
advanced signature schemes is a commutative group action where the structure of the …
advanced signature schemes is a commutative group action where the structure of the …
[图书][B] Applied Cryptography and Network Security: 22nd International Conference, ACNS 2024, Abu Dhabi, United Arab Emirates, March 5-8, 2024, Proceedings. Part …
C Pöpper - 2024 - books.google.com
The 3-volume set LNCS 14583-14585 constitutes the proceedings of the 22nd International
Conference on Applied Cryptography and Network Security, ACNS 2024, which took place …
Conference on Applied Cryptography and Network Security, ACNS 2024, which took place …
[PDF][PDF] The Hidden Subgroup Problem and Quantum Cryptanalysis
M Imran - repozitorium.omikk.bme.hu
In this thesis, we consider the hidden subgroup problem (HSP). Let G be a finite group, and
suppose we are given a function f on G such that f is constant and distinct on different left …
suppose we are given a function f on G such that f is constant and distinct on different left …