SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH

[1]  David Jao,et al.  Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2011, J. Math. Cryptol..

[2]  David Jao,et al.  Constructing elliptic curve isogenies in quantum subexponential time , 2010, J. Math. Cryptol..

[3]  Tanja Lange,et al.  CSIDH: An Efficient Post-Quantum Commutative Group Action , 2018, IACR Cryptol. ePrint Arch..

[4]  Steven D. Galbraith,et al.  On the Security of Supersingular Isogeny Cryptosystems , 2016, ASIACRYPT.

[5]  Eike Kiltz,et al.  A Modular Analysis of the Fujisaki-Okamoto Transformation , 2017, TCC.

[6]  Kristin E. Lauter,et al.  Cryptographic Hash Functions from Expander Graphs , 2008, Journal of Cryptology.

[7]  Steven D. Galbraith,et al.  An adaptive attack on 2-SIDH , 2020, Int. J. Comput. Math. Comput. Syst. Theory.

[8]  G. Ballew,et al.  The Arithmetic of Elliptic Curves , 2020, Elliptic Curves.

[9]  André Schrottenloher,et al.  Quantum Security Analysis of CSIDH , 2020, EUROCRYPT.

[10]  Luca De Feo,et al.  Verifiable Delay Functions from Supersingular Isogenies and Pairings , 2019, IACR Cryptol. ePrint Arch..

[11]  Andrea Basso,et al.  On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol , 2020, IACR Cryptol. ePrint Arch..

[12]  David Jao,et al.  New Techniques for SIDH-based NIKE , 2020, J. Math. Cryptol..

[13]  F. Rodríguez-Henríquez,et al.  The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents , 2021, Journal of Cryptographic Engineering.

[14]  Tsuyoshi Takagi,et al.  SiGamal: A supersingular isogeny-based PKE and its application to a PRF , 2020, IACR Cryptol. ePrint Arch..

[15]  Tako Boris Fouotsa,et al.  SimS: A Simplification of SiGamal , 2021, PQCrypto.

[16]  Reza Azarderakhsh,et al.  Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances , 2017, SAC.

[17]  Tatsuaki Okamoto,et al.  Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.

[18]  Péter Kutas,et al.  One-way functions and malleability oracles: Hidden shift attacks on isogeny-based protocols , 2021, IACR Cryptol. ePrint Arch..

[19]  David Jao,et al.  Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies , 2014, J. Math. Cryptol..

[20]  Christophe Petit,et al.  Faster Algorithms for Isogeny Problems Using Torsion Point Images , 2017, ASIACRYPT.

[21]  Chris Peikert,et al.  He Gives C-Sieves on the CSIDH , 2020, IACR Cryptol. ePrint Arch..