Review of Chosen Isogeny-Based Cryptographic Schemes

Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the...

Full description

Bibliographic Details
Main Authors: Bartosz Drzazga, Łukasz Krzywiecki
Format: Article
Language:English
Published: MDPI AG 2022-05-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/6/2/27