SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH
暂无分享,去创建一个
[1] David Jao,et al. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2011, J. Math. Cryptol..
[2] David Jao,et al. Constructing elliptic curve isogenies in quantum subexponential time , 2010, J. Math. Cryptol..
[3] Tanja Lange,et al. CSIDH: An Efficient Post-Quantum Commutative Group Action , 2018, IACR Cryptol. ePrint Arch..
[4] Steven D. Galbraith,et al. On the Security of Supersingular Isogeny Cryptosystems , 2016, ASIACRYPT.
[5] Eike Kiltz,et al. A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.
[6] Kristin E. Lauter,et al. Cryptographic Hash Functions from Expander Graphs , 2008, Journal of Cryptology.
[7] Steven D. Galbraith,et al. An adaptive attack on 2-SIDH , 2020, Int. J. Comput. Math. Comput. Syst. Theory.
[8] G. Ballew,et al. The Arithmetic of Elliptic Curves , 2020, Elliptic Curves.
[9] André Schrottenloher,et al. Quantum Security Analysis of CSIDH , 2020, EUROCRYPT.
[10] Luca De Feo,et al. Verifiable Delay Functions from Supersingular Isogenies and Pairings , 2019, IACR Cryptol. ePrint Arch..
[11] Andrea Basso,et al. On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol , 2020, IACR Cryptol. ePrint Arch..
[12] David Jao,et al. New Techniques for SIDH-based NIKE , 2020, J. Math. Cryptol..
[13] F. Rodríguez-Henríquez,et al. The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents , 2021, Journal of Cryptographic Engineering.
[14] Tsuyoshi Takagi,et al. SiGamal: A supersingular isogeny-based PKE and its application to a PRF , 2020, IACR Cryptol. ePrint Arch..
[15] Tako Boris Fouotsa,et al. SimS: A Simplification of SiGamal , 2021, PQCrypto.
[16] Reza Azarderakhsh,et al. Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances , 2017, SAC.
[17] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[18] Péter Kutas,et al. One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols , 2021, IACR Cryptol. ePrint Arch..
[19] David Jao,et al. Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2014, J. Math. Cryptol..
[20] Christophe Petit,et al. Faster Algorithms for Isogeny Problems Using Torsion Point Images , 2017, ASIACRYPT.
[21] Chris Peikert,et al. He Gives C-Sieves on the CSIDH , 2020, IACR Cryptol. ePrint Arch..