\u3cp\u3eChoosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and the cost of each query. This paper analyzes algorithms for each query, introducing several new speedups while showing that some previous claims were too optimistic for the attacker. This paper includes a full computer-verified simulation of its main algorithm down to the bit-operation level.\u3c/p\u3
The current hype of quantum computing has necessitated the need for computer security stakeholders t...
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image a...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires c...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
In this survey, the authors review the main quantum algorithms for solving the computational problem...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) ha...
The significant interest in cryptographic primitives providing sound security margins when facing at...
The security of public-key cryptography depends on the computational intractability of some hard pro...
We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key...
The NIST Post-Quantum standardization initiative, that entered its fourth round, aims to select asym...
The current hype of quantum computing has necessitated the need for computer security stakeholders t...
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image a...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires c...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
In this survey, the authors review the main quantum algorithms for solving the computational problem...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
We present the first complete descriptions of quantum circuits for the offline Simon’s algorithm, an...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) ha...
The significant interest in cryptographic primitives providing sound security margins when facing at...
The security of public-key cryptography depends on the computational intractability of some hard pro...
We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key...
The NIST Post-Quantum standardization initiative, that entered its fourth round, aims to select asym...
The current hype of quantum computing has necessitated the need for computer security stakeholders t...
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image a...
Cryptography is widely used and implemented, particularly in a modern-day setting. Of note to the fi...