Torsion point attacks on ‘SIDH‐like’ cryptosystems

Abstract Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted t...

Full description

Saved in:
Bibliographic Details
Main Authors: Péter Kutas, Christophe Petit
Format: Article
Language:English
Published: Wiley 2023-03-01
Series:IET Information Security
Online Access:https://doi.org/10.1049/ise2.12076
Tags: Add Tag
No Tags, Be the first to tag this record!

Similar Items