Author:
Cervantes-Vázquez Daniel,Chenu Mathilde,Chi-Domínguez Jesús-Javier,De Feo Luca,Rodríguez-Henríquez Francisco,Smith Benjamin
Publisher
Springer International Publishing
Reference30 articles.
1. Lecture Notes in Computer Science;DJ Bernstein,2008
2. Bernstein, D.J., Hamburg, M., Krasnova, A., Lange, T.: Elligator: elliptic-curve points indistinguishable from uniform random strings. In: 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS 2013, Berlin, Germany, 4–8 November 2013, pp. 967–980 (2013)
3. Lecture Notes in Computer Science;DJ Bernstein,2019
4. Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. IACR Cryptology ePrint Archive 2019/498 (2019)
5. Castryck, W., Galbraith, S.D., Farashahi, R.R.: Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation. Cryptology ePrint Archive, 2008/218 (2008)
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Efficient Post-Quantum Secure Deterministic Threshold Wallets from Isogenies;Proceedings of the 19th ACM Asia Conference on Computer and Communications Security;2024-07
2. Optimizations and Practicality of High-Security CSIDH;IACR Communications in Cryptology;2024-04-09
3. Secure Messaging Using Post-Quantum Key Sharing Based on CSIDH and Fujisaki-Okamoto Transform;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2024-03-25
4. Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE;Lecture Notes in Computer Science;2024
5. How to construct CSIDH on Edwards curves;Finite Fields and Their Applications;2023-12