×

Found 571 Documents (Results 1–100)

100
MathJax

An isogeny-based ID protocol using structured public keys. (English) Zbl 07550469

Paterson, Maura B. (ed.), Cryptography and coding. 18th IMA international conference, IMACC 2021, virtual event, December 14–15, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13129, 179-197 (2021).
PDF BibTeX XML Cite
Full Text: DOI

Resistance of isogeny-based cryptographic implementations to a fault attack. (English) Zbl 07543903

Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 255-276 (2021).
MSC:  94A60 81P94 14G50
PDF BibTeX XML Cite
Full Text: DOI

Full key recovery side-channel attack against ephemeral SIKE on the cortex-M4. (English) Zbl 07543902

Bhasin, Shivam (ed.) et al., Constructive side-channel analysis and secure design. 12th international workshop, COSADE 2021, Lugano, Switzerland, October 25–27, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12910, 228-254 (2021).
MSC:  94A60 81P94 68P25
PDF BibTeX XML Cite
Full Text: DOI

Improved supersingularity testing of elliptic curves using Legendre form. (English) Zbl 07497952

Boulier, François (ed.) et al., Computer algebra in scientific computing. 23rd international workshop, CASC 2021, Sochi, Russia, September 13–17, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12865, 121-135 (2021).
MSC:  68W30
PDF BibTeX XML Cite
Full Text: DOI

An efficient authenticated key exchange from random self-reducibility on CSIDH. (English) Zbl 07497440

Hong, Deukjo (ed.), Information security and cryptology – ICISC 2020. 23rd international conference, Seoul, South Korea, December 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12593, 58-84 (2021).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Memory optimization techniques for computing discrete logarithms in compressed SIKE. (English) Zbl 1485.94093

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 296-315 (2021).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

CSI-RAShi: distributed key generation for CSIDH. (English) Zbl 1485.94057

Cheon, Jung Hee (ed.) et al., Post-quantum cryptography. 12th international workshop, PQCrypto 2021, Daejeon, South Korea, July 20–22, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12841, 257-276 (2021).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI

An alternative approach for SIDH arithmetic. (English) Zbl 1479.94134

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 27-44 (2021).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Group key exchange protocols from supersingular isogenies. (English) Zbl 1479.94167

Wu, Yongdong (ed.) et al., Information security and cryptology. 16th international conference, Inscrypt 2020, Guangzhou, China, December 11–14, 2020. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 12612, 157-173 (2021).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem. (English) Zbl 1483.94040

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 272-301 (2021).
PDF BibTeX XML Cite
Full Text: DOI

One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols. (English) Zbl 1479.94203

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12696, 242-271 (2021).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Constructing Jacobian varieties with many elliptic curves. (English) Zbl 1464.30010

Comparin, Paola (ed.) et al., Geometry at the frontier. Symmetries and moduli spaces of algebraic varieties. 2016–2018 workshops, Universidad de la Frontera, Pucón, Chile, November 2016, November 2017, November 2018. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 766, 201-215 (2021).
PDF BibTeX XML Cite
Full Text: DOI

A decomposition of the Jacobian of a Humbert-Edge curve. (English) Zbl 1464.14029

Comparin, Paola (ed.) et al., Geometry at the frontier. Symmetries and moduli spaces of algebraic varieties. 2016–2018 workshops, Universidad de la Frontera, Pucón, Chile, November 2016, November 2017, November 2018. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 766, 31-38 (2021).
MSC:  14H40 14H37 14K02
PDF BibTeX XML Cite
Full Text: DOI arXiv

Rational isogenies from irrational endomorphisms. (English) Zbl 07496561

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 523-548 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Quantum security analysis of CSIDH. (English) Zbl 07496560

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 493-522 (2020).
MSC:  94A60
PDF BibTeX XML Cite
Full Text: DOI

Threshold schemes from isogeny assumptions. (English) Zbl 1481.94095

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 187-212 (2020).
MSC:  94A60 94A62 81P94
PDF BibTeX XML Cite
Full Text: DOI

Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512. (English) Zbl 1481.94139

Kiayias, Aggelos (ed.) et al., Public-key cryptography – PKC 2020. 23rd IACR international conference on practice and theory of public-key cryptography, Edinburgh, UK, May 4–7, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12111, 157-186 (2020).
MSC:  94A62 94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Computing modular polynomials and isogenies of rank two Drinfeld modules over finite fields. (English) Zbl 1469.11178

Brenner, Susanne C. (ed.) et al., 75 years of mathematics of computation. Symposium celebrating 75 years of mathematics of computation, Institute for Computational and Experimental Research in Mathematics, ICERM, Providence, RI, USA, November 1–3, 2018. Providence, RI: American Mathematical Society (AMS). Contemp. Math. 754, 283-313 (2020).
MSC:  11G09 11Y16 11Y40
PDF BibTeX XML Cite
Full Text: DOI

Optimized arithmetic operations for isogeny-based cryptography on Huff curves. (English) Zbl 1466.94028

Liu, Joseph K. (ed.) et al., Information security and privacy. 25th Australasian conference, ACISP 2020, Perth, WA, Australia, November 30 – December 2, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12248, 23-40 (2020).
PDF BibTeX XML Cite
Full Text: DOI

Counting Richelot isogenies between superspecial abelian surfaces. (English) Zbl 1456.14055

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 283-300 (2020).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs. (English) Zbl 1460.11148

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 215-232 (2020).
PDF BibTeX XML Cite
Full Text: DOI arXiv

Supersingular curves with small noninteger endomorphisms. (English) Zbl 1460.11093

Galbraith, Steven D. (ed.), ANTS XIV. Proceedings of the fourteenth algorithmic number theory symposium, Auckland, New Zealand, virtual event, June 29 – July 4, 2020. Berkeley, CA: Mathematical Sciences Publishers (MSP). Open Book Ser. 4, 7-22 (2020).
MSC:  11G20 14H52
PDF BibTeX XML Cite
Full Text: DOI arXiv

On collisions related to an ideal class of order 3 in CSIDH. (English) Zbl 1485.94113

Aoki, Kazumaro (ed.) et al., Advances in information and computer security. 15th international workshop on security, IWSEC 2020, Fukui, Japan, September 2–4, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12231, 131-148 (2020).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

How not to create an isogeny-based PAKE. (English) Zbl 07314282

Conti, Mauro (ed.) et al., Applied cryptography and network security. 18th international conference, ACNS 2020, Rome, Italy, October 19–22, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12146, 169-186 (2020).
MSC:  68M25 94A60
PDF BibTeX XML Cite
Full Text: DOI

How to construct CSIDH on Edwards curves. (English) Zbl 1457.94165

Jarecki, Stanislaw (ed.), Topics in cryptology – CT-RSA 2020. The cryptographers’ track at the RSA conference 2020, San Francisco, CA, USA, February 24–28, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12006, 512-537 (2020).
MSC:  94A60 81P94
PDF BibTeX XML Cite
Full Text: DOI

Security analysis of group action inverse problem with auxiliary inputs with application to CSIDH parameters. (English) Zbl 1457.94215

Seo, Jae Hong (ed.), Information security and cryptology – ICISC 2019. 22nd international conference, Seoul, South Korea, December 4–6, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11975, 165-174 (2020).
MSC:  94A62 94A60
PDF BibTeX XML Cite
Full Text: DOI

Supersingular isogeny graphs in cryptography. (English) Zbl 1476.94028

Lo, Allan (ed.) et al., Surveys in combinatorics 2019. Papers based on the 27th British combinatorial conference, University of Birmingham, Birmingham, UK, July 29 – August 2, 2019. Cambridge: Cambridge University Press. Lond. Math. Soc. Lect. Note Ser. 456, 143-165 (2019).
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Classification

all top 3

Software