Radical e´ lu N Isogeny Formulae

T Decru - Annual International Cryptology Conference, 2024 - Springer
We provide explicit radical N-isogeny formulae for all odd integers N. The formulae are
compact closed-form expressions which require one N th root computation and O (N) basic …

Towards a quantum-resistant weak verifiable delay function

T Decru, L Maino, A Sanso - … on Cryptology and Information Security in …, 2023 - Springer
In this paper, we present a new quantum-resistant weak Verifiable Delay Function based on
a purely algebraic construction. Its delay depends on computing a large-degree isogeny …

[PDF][PDF] On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH.

F Campos, J Chavez-Saab… - IACR Cryptol. ePrint …, 2023 - cryptojedi.org
The isogeny-based scheme CSIDH is considered to be the only efficient post-quantum non-
interactive key exchange (NIKE) and poses small bandwidth requirements, thus appearing …

[PDF][PDF] Optimizations and practicality of high-security CSIDH

F Campos, J Chavez-Saab, JJ Chi-Domínguez… - 2024 - repository.ubn.ru.nl
In this work, we assess the real-world practicality of CSIDH, an isogenybased non-
interactive key exchange. We provide the first thorough assessment of the practicality of …

Effective pairings in isogeny-based cryptography

K Reijnders - … Conference on Cryptology and Information Security in …, 2023 - Springer
Pairings are useful tools in isogeny-based cryptography and have been used in SIDH/SIKE
and other protocols. As a general technique, pairings can be used to move problems about …

HPQKE: Hybrid Post-Quantum Key Exchange Protocol for SSH Transport Layer from CSIDH

M Qi, C Chen - IEEE Transactions on Information Forensics …, 2025 - ieeexplore.ieee.org
Secure Shell (SSH) is a robust cryptographic network protocol designed to establish a
secure and encrypted connection over potentially insecure networks, which is typically used …

[HTML][HTML] Recovery for secret key in CTIDH-512 through Fault Injection Attack

H Kim, W Im, S Jeong, H Kim, C Seo, C Kang - Computers and Electrical …, 2025 - Elsevier
Isogeny-based cryptography is secure in a quantum computing environment and offers
relatively small key sizes compared to other post-quantum cryptographic schemes …

Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques

T Chiu, J LeGrow, W **ong - Proceedings of the 2024 Workshop on …, 2024 - dl.acm.org
Commutative Supersingular Isogeny Diffie-Hellman (CSIDH) is an isogeny-based key
exchange protocol which is believed to be se-cure even when parties use long-lived secret …

dCTIDH: Fast & Deterministic CTIDH

F Campos, A Hellenbrand, M Meyer… - Cryptology ePrint …, 2025 - eprint.iacr.org
This paper presents dCTIDH, a CSIDH implementation that combines two recent
developments into a novel state-of-the-art deterministic implementation. We combine the …

Fault Attack on SQIsign

J Lee, D Heo, H Kim, G Kim, S Kim, H Kim… - … Conference on Post …, 2024 - Springer
In this paper, we introduce the first fault attack on SQIsign. By injecting a fault into the ideal
generator during the commitment phase, we demonstrate a meaningful probability of …