Torsion point attacks on ‘SIDH‐like’ cryptosystems

Abstract Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation mechanism SIKE, which was submitted t...

Full description

Bibliographic Details
Main Authors: Péter Kutas, Christophe Petit
Format: Article
Language:English
Published: Hindawi-IET 2023-03-01
Series:IET Information Security
Online Access:https://doi.org/10.1049/ise2.12076