<--- Back to Details
First PageDocument Content
Cryptography / Post-quantum cryptography / Public-key cryptography / Supersingular isogeny key exchange / Sidh / Elliptic curve cryptography / DiffieHellman key exchange / Isogeny / Elliptic curve / Supersingular variety / Whitfield Diffie / Isogenous
Date: 2018-01-13 06:28:10
Cryptography
Post-quantum cryptography
Public-key cryptography
Supersingular isogeny key exchange
Sidh
Elliptic curve cryptography
DiffieHellman key exchange
Isogeny
Elliptic curve
Supersingular variety
Whitfield Diffie
Isogenous

Practical post-quantum key exchange from the Learning with Errors Problem

Add to Reading List

Source URL: rwc.iacr.org

Download Document from Source Website

File Size: 1,84 MB

Share Document on Facebook

Similar Documents

Algebra / Abstract algebra / Mathematics / Finite fields / Integer factorization algorithms / Elliptic curves / Group theory / Lenstra elliptic-curve factorization / Elliptic curve / Elliptic curve primality / Factorization of polynomials over finite fields

Implementing the Elliptic Curve Method of Factoring in Reconfigurable Hardware Kris Gaj, Soonhak Kwon, Patrick Baier, Paul Kohlbrenner, Hoang Le, Mohammed Khaleeluddin, Ramakrishna Bachimanchi George Mason University {kg

DocID: 1xVNI - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Public-key cryptography / Group theory / Elliptic-curve cryptography / Elliptic curve / XTR / Elliptic curve only hash / Supersingular isogeny key exchange

Hardware for Collision Search on Elliptic Curve over GF(2m) Philippe Bulens∗, Guerric Meurice de Dormale† and Jean-Jacques Quisquater UCL Crypto Group Universit´e Catholique de Louvain

DocID: 1xVem - View Document

Cryptography / Abstract algebra / Algebra / Finite fields / Elliptic curve cryptography / Computational hardness assumptions / Group theory / Public-key cryptography / Elliptic-curve cryptography / Elliptic curve / Key size / Discrete logarithm

On the Security of Elliptic Curve Cryptosystems against Attacks with Special-Purpose Hardware Tim G¨ uneysu, Christof Paar, Jan Pelzl Horst G¨ortz Institute for IT Security, Ruhr University Bochum, Germany {gueneysu,cp

DocID: 1xUIc - View Document

Finite fields / Algebraic number theory / Frobenius endomorphism / Galois theory / Meurice / Jean-Jacques Quisquater / Mathematics

Hardware for Collision Search m on Elliptic Curve over GF(2 ) Philippe Bulens (S), Guerric Meurice de Dormale and Jean-Jacques Quisquater {bulens, gmeurice, quisquater}@dice.ucl.ac.be

DocID: 1xUdt - View Document