Torsion point attacks on ‘SIDH‐like’ cryptosystems
Abstract Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted t...
Saved in:
| Main Authors: | Péter Kutas, Christophe Petit |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Wiley
2023-03-01
|
| Series: | IET Information Security |
| Online Access: | https://doi.org/10.1049/ise2.12076 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Performance and Efficiency Evaluation of M-SIDH
by: Suhri Kim
Published: (2024-01-01) -
Partial Exposure Attacks Against a Family of RSA-like Cryptosystems
by: George Teşeleanu
Published: (2024-12-01) -
SIDH: A Game-Based Architecture for a Training Simulator
by: P. Backlund, et al.
Published: (2009-01-01) -
A simple and efficient attack on the Merkle-Hellman knapsack cryptosystem.
by: Jingguo Bi, et al.
Published: (2025-01-01) -
Fault-injection attack on countermeasure algorithms of RSA-CRT cryptosystem
by: Fanyu KONG, et al.
Published: (2019-02-01)