Review of Chosen Isogeny-Based Cryptographic Schemes
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the...
Main Authors: | Bartosz Drzazga, Łukasz Krzywiecki |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2022-05-01
|
Series: | Cryptography |
Subjects: | |
Online Access: | https://www.mdpi.com/2410-387X/6/2/27 |
Similar Items
-
Optimized CSIDH Implementation Using a 2-Torsion Point
by: Donghoe Heo, et al.
Published: (2020-07-01) -
Practical Usage of Radical Isogenies for CSIDH
by: Donghoe Heo, et al.
Published: (2023-01-01) -
Towards Isogeny-Based Password-Authenticated Key Establishment
by: Taraskin Oleg, et al.
Published: (2020-11-01) -
SIKE on GPU: Accelerating Supersingular Isogeny-Based Key Encapsulation Mechanism on Graphic Processing Units
by: Seog Chung Seo
Published: (2021-01-01) -
An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies
by: Yan Huang, et al.
Published: (2019-01-01)