<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Public-key cryptography / Supersingular isogeny key exchange / Sidh / Elliptic curve cryptography / DiffieHellman key exchange / Isogeny / Elliptic curve / Supersingular variety / Whitfield Diffie / Isogenous
Date: 2018-01-13 06:28:10
Cryptography
Post-quantum cryptography
Public-key cryptography
Supersingular isogeny key exchange
Sidh
Elliptic curve cryptography
DiffieHellman key exchange
Isogeny
Elliptic curve
Supersingular variety
Whitfield Diffie
Isogenous

Practical post-quantum key exchange from the Learning with Errors Problem

Add to Reading List

Source URL: rwc.iacr.org

Download Document from Source Website

File Size: 1,84 MB

Share Document on Facebook

Similar Documents

Isogeny graphs, modular polynomials, and applications Proefschrift ter verkrijging van de graad van Doctor aan de Universiteit Leiden

DocID: 1vkW5 - View Document

Isogeny Graphs in Genus 2 Chloe Martindale (Universiteit Leiden and Universit´e de Bordeaux) Supervised by Marco Streng (Leiden) and Damien Robert (Bordeaux) March 5, 2015 Abstract Traditionally, an isogeny graph is a g

DocID: 1vdhH - View Document

Isogeny graphs with maximal real multiplication Sorina Ionica1 and Emmanuel Thomé2 1 arXiv:1407.6672v3 [math.NT] 23 Feb 2018

DocID: 1v6vb - View Document

Loop-abort faults on supersingular isogeny cryptosystems Alexandre Gélin Benjamin Wesolowski

DocID: 1v4SM - View Document

Efficient algorithms for supersingular isogeny Diffie-Hellman Craig Costello Joint work with Patrick Longa and Michael Naehrig Diffie-Hellman key exchange (circa 1976)

DocID: 1uXO8 - View Document