70
Views
8
CrossRef citations to date
0
Altmetric
Articles

An adaptive attack on 2-SIDH

ORCID Icon, ORCID Icon, , & ORCID Icon
Pages 282-299 | Received 04 Jun 2020, Accepted 01 Sep 2020, Published online: 24 Sep 2020

References

  • R. Azarderakhsh, D. Jao, and C. Leonardi, Post-quantum static-static key agreement using multiple protocol instances, SAC 2017, Springer, 2017, pp. 45–63.
  • W. Castryck, T. Lange, C. Martindale, L. Panny, and J. Renes, CSIDH: An efficient post-quantum commutative group action, ASIACRYPT 2018, Springer, 2018, pp. 395–427.
  • D.X. Charles, K.E. Lauter, and E.Z. Goren, Cryptographic Hash functions from expander graphs, J. Cryptology 22 (2009), pp. 93–113. doi: 10.1007/s00145-007-9002-x
  • L. De Feo, D. Jao, and J. Plût, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, J. Math. Cryptology 8(3) (2014), pp. 209–247. doi: 10.1515/jmc-2012-0015
  • S.D. Galbraith, C. Petit, B. Shani, and Y. B. Ti, On the security of supersingular isogeny cryptosystems, in Advances in Cryptology – ASIACRYPT 2016, J.H. Cheon and T. Takagi, eds., Springer, Heidelberg, 2016, pp. 63–91.
  • D. Jao and L. De Feo, Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies, PQCrypto 2011, Springer, 2011, pp. 19–34.
  • S. Kayacan, A note on the static-static key agreement protocol from supersingular isogenies, Cryptology ePrint Archive, Report 2019/815, 2019. Available at https://eprint.iacr.org/2019/815
  • J. Vélu, Isogénies entre courbes elliptiques, C. R. Acad. Sci. Paris Sér. A-B 273 (1971), pp. A238–A241.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.