“…Hence, the recovered secret key can only be useful if the key generation procedure commits the sin of using the same private key, something that should not happen in any proper implementation of SIDH or SIKE. 5 Further, there exist a simple and inexpensive countermeasure to prevent Ti's attack, which is checking the order or correctness of the auxiliary points before to their publication [25,24,4].…”