Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on the set of supersingular elliptic curves. The commutativity property gives CSIDH enough flexibility to allow the creation of many cryptographic primitives and protocols. Nevertheless, these operations are limited and more complex applications have not yet been proposed. When calling the composition of two group elements of G addition, our goal in this work is to explore exponentiation, multiplication with public elements, and multiplication between secret elements of this group. We first introduce a two-party interactive protocol for multiplication of secret group elements. Then, we explore zero-knowledge proofs of these different arithmetic ...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...
We propose an efficient commutative group action suitablefor non-interactive key exchange in a post-...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post...
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on t...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingu...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
We define and analyze the Commutative Isogeny Hidden Number Problem which is the natural analogue of...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a prac...
We define semi-commutative invertible masking structures which aim to capture the methodology of ex...
International audienceWe investigate the isogeny graphs of supersingular elliptic curves over $\math...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...
We propose an efficient commutative group action suitablefor non-interactive key exchange in a post-...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post...
Isogeny computations in CSIDH (Asiacrypt 2018) are described using a commutative group G acting on t...
For primes p≡3mod4, we show that setting up CSIDH on the surface, i.e., using supersingular elliptic...
Public-key cryptography, discovered 50 years ago by Whitfield Diffie and Martin Hellman,uses pairs o...
We analyze the Commutative Supersingular Isogeny Diffie-Hellman protocol (CSIDH), a novel supersingu...
We construct a new post-quantum cryptosystem which consists of enhancing CSIDH and similar cryptosys...
We define and analyze the Commutative Isogeny Hidden Number Problem which is the natural analogue of...
CSIDH is an isogeny-based post-quantum key establishment protocol proposed in 2018. In this work, we...
Many public-key cryptosystems and, more generally, cryptographic protocols, use group exponentiation...
Delegating heavy computations to auxiliary servers, while keeping the inputs secret, presents a prac...
We define semi-commutative invertible masking structures which aim to capture the methodology of ex...
International audienceWe investigate the isogeny graphs of supersingular elliptic curves over $\math...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post...
Isogeny-based cryptography is an instance of post-quantum cryptography whose fundamental problem con...
We propose an efficient commutative group action suitablefor non-interactive key exchange in a post-...
We propose an efficient commutative group action suitable for non-interactive key exchange in a post...