Quantum computers represent an existential threat to current techniques in cryptography. However, systems such as Supersingular Isogeny Diffie-Hellman (SIDH) and Commutative-SIDH (CSIDH) are potential working solutions that are believed to be resistant to quantum attacks, and as viable candidates, it is important to study the efficiency and security of such systems. Both protocols rely on the computational complexity of solving the isogeny problem. This problem corresponds to finding a path between two known vertices in a large well-connected graph known as the isogeny graph. We investigate the isogeny graphs related to SIDH and CSIDH systems. We then consider the adjacency matrices associated with these graphs and establish the corresponde...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number t...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Public key cryptography plays a crucial role in securing our everyday communications. However, as Pe...
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured di...
Supersingular isogeny Diffie-Hellman key exchange (SIDH) is a post-quantum protocol based on the pre...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
abstract: In the modern world with the ever growing importance of technology, the challenge of infor...
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number t...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Public key cryptography plays a crucial role in securing our everyday communications. However, as Pe...
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured di...
Supersingular isogeny Diffie-Hellman key exchange (SIDH) is a post-quantum protocol based on the pre...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...