Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a practical solution for computationally limited devices to use resource-intense cryptographic protocols, such as those based on isogenies, and thus allows the deployment of post-quantum security on mobile devices and in the internet of things. We propose two algorithms for the secure and verifiable delegation of isogeny computations in the CSIDH setting. We then apply these algorithms to different instances of CSIDH and to the signing algorithms SeaSign and CSI-FiSh. Our algorithms present a communication-cost trade-off. Asymptotically (for high communication), the cost for the delegator is reduced by a factor 9 for the original CSIDH-512 paramete...
We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic grou...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key...
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) ha...
We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingu...
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires c...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic grou...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key...
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) ha...
We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingu...
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires c...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, presented at ASIACRYPT 201...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly ...
This work has been accepted in LATINCRYPT-2019International audienceCSIDH is a recent quantum-resist...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
The present thesis focus on one of the post-quantum cryptosystems, in particular, the isogenybased c...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH...
We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic grou...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
We exploit the Diffie-Hellman-like structure of CSIDH to build a quantum-resistant authenticated key...