Quantum cryptography in 5G networks: A comprehensive overview

M Mehic, L Michalek, E Dervisevic… - … Surveys & Tutorials, 2023 - ieeexplore.ieee.org
Every attempt to access to the Internet through a Web browser, email sent, VPN connection,
VoIP call, instant message or other use of telecommunications systems involves …

A survey on exotic signatures for post-quantum blockchain: Challenges and research directions

M Buser, R Dowsley, M Esgin, C Gritti… - ACM Computing …, 2023 - dl.acm.org
Blockchain technology provides efficient and secure solutions to various online activities by
utilizing a wide range of cryptographic tools. In this article, we survey the existing literature …

An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

[PDF][PDF] An efficient key recovery attack on SIDH (preliminary version).

W Castryck, T Decru - IACR Cryptol. ePrint Arch., 2022 - iacr.steepath.eu
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …

An attack on SIDH with arbitrary starting curve

L Maino, C Martindale - Cryptology ePrint Archive, 2022 - eprint.iacr.org
We present an attack on SIDH which does not require any endomorphism information on the
starting curve. Our attack has subexponential complexity thus significantly reducing the …

M-SIDH and MD-SIDH: countering SIDH attacks by masking information

TB Fouotsa, T Moriya, C Petit - … on the Theory and Applications of …, 2023 - Springer
The SIDH protocol is an isogeny-based key exchange protocol using supersingular
isogenies, designed by Jao and De Feo in 2011. The protocol underlies the SIKE algorithm …

Cryptographic group actions and applications

N Alamati, L De Feo, H Montgomery… - Advances in Cryptology …, 2020 - Springer
Isogeny-based assumptions have emerged as a viable option for quantum-secure
cryptography. Recent works have shown how to build efficient (public-key) primitives from …

SQIsign2D-East: A new signature scheme using 2-dimensional isogenies

K Nakagawa, H Onuki, W Castryck, M Chen… - … Conference on the …, 2024 - Springer
Isogeny-based cryptography is cryptographic schemes whose security is based on the
hardness of a mathematical problem called the isogeny problem, and is attracting attention …

Fast strategies for the implementation of SIKE round 3 on ARM Cortex-M4

M Anastasova, R Azarderakhsh… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Supersingular Isogeny Key Encapsulation mechanism (SIKE) is the only post-quantum
key encapsulation protocol based on elliptic curves and isogeny maps between them …

Supersingular isogeny graphs and endomorphism rings: reductions and solutions

K Eisenträger, S Hallgren, K Lauter, T Morrison… - Advances in Cryptology …, 2018 - Springer
In this paper, we study several related computational problems for supersingular elliptic
curves, their isogeny graphs, and their endomorphism rings. We prove reductions between …