SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies between supersingular elliptic curves. However, SIDH and related cryptosystems also reveal additional information: the restriction of a secret isogeny to a subgroup of the curve (torsion-point information). Petit [30] was the first to demonstrate that torsion-point information could noticeably lower the difficulty of finding secret isogenies. In particular, Petit showed that overstretched parameterizations of SIDH could be broken in polynomial time. However, this did not impact the security of any cryptosystems proposed in the literature. The contribution of this paper is twofold: First, we strengthen the techniques of [30] by exploiting ad...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
There is a recent trend in cryptography to construct protocols based on the hardness of computing is...
With the rapid progress of quantum computers in recent years, efforts have been made to standardize ...
SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies ...
We present an attack on SIDH which does not require any endomorphism information on the starting cur...
Isogeny-based cryptography is a promising approach for post-quantum cryptography. The best-known pro...
The SIDH key exchange is the main building block of SIKE, the only isogeny based scheme involved in ...
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. SIDH is a compact...
The polynomial attacks on SIDH by Castryck, Decru, Maino, Martindale and Robert have shown that, whi...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
Supersingular isogeny Diffie-Hellman key exchange (SIDH) is a post-quantum protocol based on the pre...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
There is a recent trend in cryptography to construct protocols based on the hardness of computing is...
With the rapid progress of quantum computers in recent years, efforts have been made to standardize ...
SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies ...
We present an attack on SIDH which does not require any endomorphism information on the starting cur...
Isogeny-based cryptography is a promising approach for post-quantum cryptography. The best-known pro...
The SIDH key exchange is the main building block of SIKE, the only isogeny based scheme involved in ...
Isogeny-based cryptography is one of the candidates for post-quantum cryptography. SIDH is a compact...
The polynomial attacks on SIDH by Castryck, Decru, Maino, Martindale and Robert have shown that, whi...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
Supersingular isogeny Diffie-Hellman key exchange (SIDH) is a post-quantum protocol based on the pre...
International audienceWe present Séta, 11 a new family of public-key encryption schemes with post-qu...
There is a recent trend in cryptography to construct protocols based on the hardness of computing is...
With the rapid progress of quantum computers in recent years, efforts have been made to standardize ...