Skip to main content
Go to the home page of the European Commission (opens in new window)
English English
CORDIS - EU research results
CORDIS

Isogeny-based Toolbox for Post-quantum Cryptography

CORDIS provides links to public deliverables and publications of HORIZON projects.

Links to deliverables and publications from FP7 projects, as well as links to some specific result types such as dataset and software, are dynamically retrieved from OpenAIRE .

Deliverables

Publications

Two Remarks on the Vectorization Problem (opens in new window)

Author(s): Wouter Castryck, Natan Vander Meeren
Published in: Progress in Cryptology – INDOCRYPT 2022, Issue Lecture Notes in Computer Science book series (LNCS,volume 13774), 2023, Page(s) 658–678, ISBN 978-3-031-22912-1
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-22912-1_29

Efficient Computation of (3n,3n) -Isogenies (opens in new window)

Author(s): Thomas Decru, Sabrina Kunzweiler
Published in: Progress in Cryptology - AFRICACRYPT 2023, Issue Lecture Notes in Computer Science book series (LNCS,volume 14064), 2023, Page(s) 53–78, ISBN 978-3-031-37679-5
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-37679-5_3

Weak Instances of Class Group Action Based Cryptography via Self-pairings (opens in new window)

Author(s): Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam van Buuren, Frederik Vercauteren
Published in: Advances in Cryptology – CRYPTO 2023, Issue Lecture Notes in Computer Science book series (LNCS,volume 14083), 2023, Page(s) 762–792, ISBN 978-3-031-38548-3
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-38548-3_25

Horizontal Racewalking Using Radical Isogenies (opens in new window)

Author(s): Wouter Castryck, Thomas Decru, Marc Houben, Frederik Vercauteren
Published in: Advances in Cryptology – ASIACRYPT 2022, Issue Lecture Notes in Computer Science book series (LNCS,volume 13792), 2023, Page(s) 67–96, ISBN 978-3-031-22966-4
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-22966-4_3

Practical Robust DKG Protocols for CSIDH (opens in new window)

Author(s): Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Published in: ACNS 2023: Applied Cryptography and Network Security, Issue LNCS,volume 13906, 2023, Page(s) 219–247, ISBN 978-3-031-33490-0
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-33491-7_9

An Efficient Key Recovery Attack on SIDH (opens in new window)

Author(s): Wouter Castryck, Thomas Decru
Published in: Advances in Cryptology – EUROCRYPT 2023, Issue Lecture Notes in Computer Science book series (LNCS,volume 14008), 2023, Page(s) 423–447, ISBN 978-3-031-30589-4
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-30589-4_15

CSI-SharK: CSI-FiSh with Sharing-friendly Keys (opens in new window)

Author(s): Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Published in: ACISP 2023: Information Security and Privacy, Issue LNCS,volume 13915, 2023, Page(s) 471–502, ISBN 978-3-031-35485-4
Publisher: Springer, Cham
DOI: 10.1007/978-3-031-35486-1_21

Radical $$\root N \of {\mathrm {\acute{e}lu}}$$ Isogeny Formulae (opens in new window)

Author(s): Thomas Decru
Published in: Lecture Notes in Computer Science, Advances in Cryptology – CRYPTO 2024, Issue 14924, 2024, Page(s) 107-128, ISBN 978-3-031-68387-9
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-68388-6_5

A Polynomial Time Attack on Instances of M-SIDH and FESTA (opens in new window)

Author(s): Wouter Castryck, Frederik Vercauteren
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2023, Issue LNCS,volume 14444, 2023, Page(s) 127-156, ISBN 978-981-99-8738-2
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-99-8739-9_5

VSS fromDistributed ZK Proofs andApplications (opens in new window)

Author(s): Shahla Atapoor, Karim Baghery, Daniele Cozzo, Robi Pedersen
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2023, 2024, Page(s) 405-440
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-99-8721-4_13

SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies (opens in new window)

Author(s): Kohei Nakagawa, Hiroshi Onuki, Wouter Castryck, Mingjie Chen, Riccardo Invernizzi, Gioella Lorenzon, Frederik Vercauteren
Published in: Lecture Notes in Computer Science, Advances in Cryptology – ASIACRYPT 2024, 2024, Page(s) 272-303
Publisher: Springer Nature Singapore
DOI: 10.1007/978-981-96-0891-1_9

New Proof Systems andanOPRF fromCSIDH (opens in new window)

Author(s): Cyprien Delpech de Saint Guilhem, Robi Pedersen
Published in: Lecture Notes in Computer Science, Public-Key Cryptography – PKC 2024, 2024, Page(s) 217-251
Publisher: Springer Nature Switzerland
DOI: 10.1007/978-3-031-57725-3_8

Breaking the Decisional Diffie–Hellman Problem for Class Group Actions Using Genus Theory: Extended Version (opens in new window)

Author(s): Wouter Castryck, Jana Sotáková, Frederik Vercauteren
Published in: Journal of Cryptology, Issue 35, Article number: 24 (2022), 2022, Page(s) 1-30, ISSN 0933-2790
Publisher: Springer Verlag
DOI: 10.1007/s00145-022-09435-1

On the decisional Diffie–Hellman problem for class group actions on oriented elliptic curves (opens in new window)

Author(s): Wouter Castryck, Marc Houben, Frederik Vercauteren, Benjamin Wesolowski
Published in: Research in Number Theory, Issue 8, Article number: 99 (2022), 2022, Page(s) 1-17, ISSN 2363-9555
Publisher: Springer
DOI: 10.1007/s40993-022-00399-6

Searching for OpenAIRE data...

There was an error trying to search data from OpenAIRE

No results available

My booklet 0 0