Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
An efficient key recovery attack on SIDH
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …
[PDF][PDF] Status report on the third round of the NIST post-quantum cryptography standardization process
Abstract The National Institute of Standards and Technology is in the process of selecting
publickey cryptographic algorithms through a public, competition-like process. The new …
publickey cryptographic algorithms through a public, competition-like process. The new …
SQISign: compact post-quantum signatures from quaternions and isogenies
We introduce a new signature scheme, SQISign,(for Short Quaternion and Isogeny
Signature) from isogeny graphs of supersingular elliptic curves. The signature scheme is …
Signature) from isogeny graphs of supersingular elliptic curves. The signature scheme is …
SQISignHD: new dimensions in cryptography
We introduce SQIsignHD, a new post-quantum digital signature scheme inspired by
SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on …
SQIsign. SQIsignHD exploits the recent algorithmic breakthrough underlying the attack on …
SCALLOP: scaling the CSI-FiSh
We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves
with Prime conductor, a new group action based on isogenies of supersingular curves …
with Prime conductor, a new group action based on isogenies of supersingular curves …
The supersingular isogeny path and endomorphism ring problems are equivalent
B Wesolowski - 2021 IEEE 62nd Annual Symposium on …, 2022 - ieeexplore.ieee.org
We prove that the path-finding problem in isogeny graphs and the endomorphism ring
problem for supersingular elliptic curves are equivalent under reductions of polynomial …
problem for supersingular elliptic curves are equivalent under reductions of polynomial …
Verifiable delay functions from supersingular isogenies and pairings
We present two new Verifiable Delay Functions (VDF) based on assumptions from elliptic
curve cryptography. We discuss both the advantages and drawbacks of our constructions …
curve cryptography. We discuss both the advantages and drawbacks of our constructions …
Supersingular curves you can trust
Generating a supersingular elliptic curve such that nobody knows its endomorphism ring is a
notoriously hard task, despite several isogeny-based protocols relying on such an object. A …
notoriously hard task, despite several isogeny-based protocols relying on such an object. A …
The supersingular endomorphism ring and one endomorphism problems are equivalent
A Page, B Wesolowski - Annual International Conference on the Theory …, 2024 - Springer
Abstract The supersingular Endomorphism Ring problem is the following: given a
supersingular elliptic curve, compute all of its endomorphisms. The presumed hardness of …
supersingular elliptic curve, compute all of its endomorphisms. The presumed hardness of …
QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras
Abstract In 2023, Basso, Maino, and Pope proposed FESTA (Fast Encryption from
Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that …
Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that …