-
Chapter and Conference Paper
Implementation Report of the Kohel–Lauter–Petit–Tignol Algorithm for the Constructive Deuring Correspondence
For an odd prime p, let \(E_0\) E 0 b...
-
Chapter and Conference Paper
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH
SIDH and CSIDH are key exchange protocols based on isogenies and conjectured to be quantum-resistant. Since the protocols are similar to the classical Diffie–Hellman, they are vulnerable to the man-in-the-midd...
-
Chapter and Conference Paper
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points
At ASIACRYPT 2018, Castryck, Lange, Martindale, Panny and Renes proposed CSIDH, which is a key-exchange protocol based on isogenies between elliptic curves, and a candidate for post-quantum cryptography