The state of elliptic curve cryptography
Since the introduction of public-key cryptography by Diffie and Hellman in 1976, the
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
potential for the use of the discrete logarithm problem in public-key cryptosystems has been …
[PDF][PDF] An overview of independent component analysis and its applications
The problem of source separation is an inductive inference problem. There is not enough
information to deduce the solution, so one must use any available information to infer the …
information to deduce the solution, so one must use any available information to infer the …
A direct key recovery attack on SIDH
We present an attack on SIDH utilising isogenies between polarized products of two
supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered …
supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered …
SQISign: compact post-quantum signatures from quaternions and isogenies
We introduce a new signature scheme, SQISign,(for Short Quaternion and Isogeny
Signature) from isogeny graphs of supersingular elliptic curves. The signature scheme is …
Signature) from isogeny graphs of supersingular elliptic curves. The signature scheme is …
CSIDH: an efficient post-quantum commutative group action
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …
An attack on SIDH with arbitrary starting curve
We present an attack on SIDH which does not require any endomorphism information on the
starting curve. Our attack has subexponential complexity thus significantly reducing the …
starting curve. Our attack has subexponential complexity thus significantly reducing the …
CSI-FiSh: efficient isogeny based signatures through class group computations
In this paper we report on a new record class group computation of an imaginary quadratic
field having 154-digit discriminant, surpassing the previous record of 130 digits. This class …
field having 154-digit discriminant, surpassing the previous record of 130 digits. This class …
Feynman integrals
S Weinzierl - arxiv preprint arxiv:2201.03593, 2022 - Springer
Feynman integrals are indispensable for precision calculations in quantum field theory. They
occur as soon as one goes beyond the leading order in perturbative quantum field theory …
occur as soon as one goes beyond the leading order in perturbative quantum field theory …
FESTA: fast encryption from supersingular torsion attacks
We introduce FESTA, an efficient isogeny-based public-key encryption (PKE) protocol based
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
SQISignHD: new dimensions in cryptography
We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by
SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on …
SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on …