2020
DOI: 10.1007/978-3-030-57808-4_24
|View full text |Cite
|
Sign up to set email alerts
|

Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
45
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(46 citation statements)
references
References 12 publications
1
45
0
Order By: Relevance
“…We downloaded the original CSIDH software [CLM + 18], all the OAYT-style and dummyfree-style constant-time CSIDH software including [OAYT19], [CCC + 19], [CR20] and [HLKA20]. All the source codes are publicly available.…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…We downloaded the original CSIDH software [CLM + 18], all the OAYT-style and dummyfree-style constant-time CSIDH software including [OAYT19], [CCC + 19], [CR20] and [HLKA20]. All the source codes are publicly available.…”
Section: Resultsmentioning
confidence: 99%
“…All the source codes are publicly available. In particular, the source code of [CLM + 18] is available at CSIDH website 12 , while the authors of [CCC + 19], [CR20] and [HLKA20] provided their source code links in their articles. In addition, although the authors of [OAYT19] did not give the link of their source code in the article, we found the source code repository of the implementation in [OAYT19] on GitHub 13 .…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations