Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Radical e´ lu N Isogeny Formulae
T Decru - Annual International Cryptology Conference, 2024 - Springer
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are
compact closed-form expressions which require one N th root computation and O (N) basic …
compact closed-form expressions which require one N th root computation and O (N) basic …
Towards a quantum-resistant weak verifiable delay function
In this paper, we present a new quantum-resistant weak Verifiable Delay Function based on
a purely algebraic construction. Its delay depends on computing a large-degree isogeny …
a purely algebraic construction. Its delay depends on computing a large-degree isogeny …
[PDF][PDF] On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH.
F Campos, J Chavez-Saab… - IACR Cryptol. ePrint …, 2023 - cryptojedi.org
The isogeny-based scheme CSIDH is considered to be the only efficient post-quantum non-
interactive key exchange (NIKE) and poses small bandwidth requirements, thus appearing …
interactive key exchange (NIKE) and poses small bandwidth requirements, thus appearing …
[PDF][PDF] Optimizations and practicality of high-security CSIDH
F Campos, J Chavez-Saab, JJ Chi-Domínguez… - 2024 - repository.ubn.ru.nl
In this work, we assess the real-world practicality of CSIDH, an isogenybased non-
interactive key exchange. We provide the first thorough assessment of the practicality of …
interactive key exchange. We provide the first thorough assessment of the practicality of …
Effective pairings in isogeny-based cryptography
K Reijnders - … Conference on Cryptology and Information Security in …, 2023 - Springer
Pairings are useful tools in isogeny-based cryptography and have been used in SIDH/SIKE
and other protocols. As a general technique, pairings can be used to move problems about …
and other protocols. As a general technique, pairings can be used to move problems about …
HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer from CSIDH
M Qi, C Chen - IEEE Transactions on Information Forensics …, 2025 - ieeexplore.ieee.org
Secure Shell (SSH) is a robust cryptographic network protocol designed to establish a
secure and encrypted connection over potentially insecure networks, which is typically used …
secure and encrypted connection over potentially insecure networks, which is typically used …
[HTML][HTML] Recovery for secret key in CTIDH-512 through Fault Injection Attack
H Kim, W Im, S Jeong, H Kim, C Seo, C Kang - Computers and Electrical …, 2025 - Elsevier
Isogeny-based cryptography is secure in a quantum computing environment and offers
relatively small key sizes compared to other post-quantum cryptographic schemes …
relatively small key sizes compared to other post-quantum cryptographic schemes …
Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) is an isogeny-based key
exchange protocol which is believed to be se-cure even when parties use long-lived secret …
exchange protocol which is believed to be se-cure even when parties use long-lived secret …
dCTIDH: Fast & Deterministic CTIDH
This paper presents dCTIDH, a CSIDH implementation that combines two recent
developments into a novel state-of-the-art deterministic implementation. We combine the …
developments into a novel state-of-the-art deterministic implementation. We combine the …
Fault Attack on SQIsign
J Lee, D Heo, H Kim, G Kim, S Kim, H Kim… - … Conference on Post …, 2024 - Springer
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal
generator during the commitment phase, we demonstrate a meaningful probability of …
generator during the commitment phase, we demonstrate a meaningful probability of …