We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order ). Let Δ = Disc() (in CSIDH, Δ = −4p for p the security parameter). Let 0 < α < 1/2, our algorithm requires
Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a prac...
\u3cp\u3eChoosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system r...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
Quantum computers represent an existential threat to current techniques in cryptography. However, sy...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The thesis is focused on the theory behind post-quantum key exchange algorithms CSIDH and SIDH. We a...
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured di...
International audienceWe present new candidates for quantum-resistant public-key cryptosystems based...
International audienceWe study two important families of problems in isogenybased cryptography and h...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
Cryptosystems based on supersingular isogenies have been proposed recently for use in post-quantum c...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a prac...
\u3cp\u3eChoosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system r...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
Quantum computers represent an existential threat to current techniques in cryptography. However, sy...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The thesis is focused on the theory behind post-quantum key exchange algorithms CSIDH and SIDH. We a...
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured di...
International audienceWe present new candidates for quantum-resistant public-key cryptosystems based...
International audienceWe study two important families of problems in isogenybased cryptography and h...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
Cryptosystems based on supersingular isogenies have been proposed recently for use in post-quantum c...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a prac...
\u3cp\u3eChoosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system r...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...