2022
DOI: 10.1007/978-3-030-95312-6_14
|View full text |Cite
|
Sign up to set email alerts
|

A New Adaptive Attack on SIDH

Abstract: Where a licence is displayed above, please note the terms and conditions of the licence govern your use of this document.When citing, please reference the published version. Take down policy While the University of Birmingham exercises care and attention in making items available there are rare occasions when an item has been uploaded in error or has been deemed to be commercially or otherwise sensitive.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 12 publications
(10 citation statements)
references
References 33 publications
(46 reference statements)
0
10
0
Order By: Relevance
“…are small, and decodes the error-correcting code to recover M. SIKE (Supersingular Isogeny Key Encapsulation) is a key encapsulation mechanism based on the hard problem of pseudo-random walks in supersingular isogeny graphs. SIKE is a relatively new problem in the cryptographic arena and currently undergoing several attacks like its instantiation SIDH (Supersingular Isogeny Diffie-Hellman key exchange protocol) [8,13,20,34,35]. These are key recovery attacks, reduces of the level security, side-channel attacks, and fault injection.…”
Section: Nist Pqc Standardization and Resultsmentioning
confidence: 99%
“…are small, and decodes the error-correcting code to recover M. SIKE (Supersingular Isogeny Key Encapsulation) is a key encapsulation mechanism based on the hard problem of pseudo-random walks in supersingular isogeny graphs. SIKE is a relatively new problem in the cryptographic arena and currently undergoing several attacks like its instantiation SIDH (Supersingular Isogeny Diffie-Hellman key exchange protocol) [8,13,20,34,35]. These are key recovery attacks, reduces of the level security, side-channel attacks, and fault injection.…”
Section: Nist Pqc Standardization and Resultsmentioning
confidence: 99%
“…He also crushed the hope for secure higher-dimensional variants of SIDH. Fouotsa, Moriya and Petit have proposed an interesting (yet impractical) variant of SIDH that aims at thwarting the current attacks [18].…”
Section: Follow-up Workmentioning
confidence: 99%
“…Another adaptive attack against SIDH (different in nature from the GPST attack) is given in Ref. [23]. The attack works in two steps.…”
Section: Another Adaptive Attackmentioning
confidence: 99%
“…One can also note that the shifted endomorphism attacks of Section 5 typically assume knowledge of the exact images of points through the secret isogeny, but Ref. [24] showed that knowing these images up to a common scalar multiple is enough.…”
Section: Active Attacksmentioning
confidence: 99%
See 1 more Smart Citation