References
- R. Azarderakhsh, D. Jao, and C. Leonardi, Post-quantum static-static key agreement using multiple protocol instances, SAC 2017, Springer, 2017, pp. 45–63.
- W. Castryck, T. Lange, C. Martindale, L. Panny, and J. Renes, CSIDH: An efficient post-quantum commutative group action, ASIACRYPT 2018, Springer, 2018, pp. 395–427.
- D.X. Charles, K.E. Lauter, and E.Z. Goren, Cryptographic Hash functions from expander graphs, J. Cryptology 22 (2009), pp. 93–113. doi: 10.1007/s00145-007-9002-x
- L. De Feo, D. Jao, and J. Plût, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, J. Math. Cryptology 8(3) (2014), pp. 209–247. doi: 10.1515/jmc-2012-0015
- S.D. Galbraith, C. Petit, B. Shani, and Y. B. Ti, On the security of supersingular isogeny cryptosystems, in Advances in Cryptology – ASIACRYPT 2016, J.H. Cheon and T. Takagi, eds., Springer, Heidelberg, 2016, pp. 63–91.
- D. Jao and L. De Feo, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, PQCrypto 2011, Springer, 2011, pp. 19–34.
- S. Kayacan, A note on the static-static key agreement protocol from supersingular isogenies, Cryptology ePrint Archive, Report 2019/815, 2019. Available at https://eprint.iacr.org/2019/815
- J. Vélu, Isogénies entre courbes elliptiques, C. R. Acad. Sci. Paris Sér. A-B 273 (1971), pp. A238–A241.