Performance and Efficiency Evaluation of M-SIDH
As the recent Castryck-Decru attack recovers the private key of SIDH in polynomial time, various methods have been proposed to prevent the attack. Among these, M-SIDH, proposed by Fouotsa et al., counters the Castryck-Decru attack by masking the torsion-point information transmitted during the key e...
Saved in:
| Main Author: | Suhri Kim |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10786215/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions
by: Donghoe Heo, et al.
Published: (2024-01-01) -
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
by: Marius A. Aardal, et al.
Published: (2024-12-01) -
Future-Proofing Security for UAVs With Post-Quantum Cryptography: A Review
by: Muhammad Asghar Khan, et al.
Published: (2024-01-01) -
Quantum vs post‐quantum security for future networks: Survey
by: Savo Glisic
Published: (2024-01-01) -
Full Key-Recovery Cubic-Time Template Attack on Classic McEliece Decapsulation
by: Vlad-Florin Drăgoi, et al.
Published: (2024-12-01)