Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 219,937,491 papers from all fields of science
Search
Sign In
Create Free Account
Supersingular isogeny key exchange
Supersingular isogeny Diffie–Hellman key exchange (SIDH) is a post-quantum cryptographic algorithm used to establish a secret key between two parties…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Bitcoin
Diffie–Hellman key exchange
Elliptic curve cryptography
General number field sieve
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Supersingular isogeny key exchange for beginners
Craig Costello
IACR Cryptology ePrint Archive
2019
Corpus ID: 208179402
This is an informal tutorial on the supersingular isogeny Diffie-Hellman protocol aimed at non-isogenists.
2019
2019
Tate-Shafarevich groups of constant elliptic curves and isogeny volcanoes
Brendan Creutz
,
J. Voloch
Contemporary Mathematics
2019
Corpus ID: 90259378
We describe the structure of Tate-Shafarevich groups of a constant elliptic curves over function fields by exploiting the volcano…
Expand
2019
2019
BIKE and SIKE Hybrid Key Exchange Cipher Suites for Transport Layer Security (TLS)
E. Crockett
,
Matthew J. Campagna
2019
Corpus ID: 132975444
This document describes new hybrid key exchange schemes for the Transport Layer Security (TLS) protocol, which are based on…
Expand
2018
2018
Optimization of Supersingular Isogeny Cryptography for Deeply Embedded Systems
J. Calhoun
2018
Corpus ID: 55384503
Public-key cryptography in use today can be broken by a quantum computer with sufficient resources. Microsoft Research has…
Expand
Review
2015
Review
2015
Overview of post-quantum public-key cryptosystems for key exchange
Annabell Kuldmaa
2015
Corpus ID: 19818072
In this report we review four post-quantum cryptosystems: the ring learning with errors key exchange, the supersingular isogeny…
Expand
2013
2013
Implementing the Schoof-Elkies-Atkin with NTL
Y. S. Kok
2013
Corpus ID: 55536769
In elliptic curve cryptography, cryptosystems are based on an additive subgroup of an elliptic curve defined over a finite field…
Expand
2011
2011
Author ' s personal copy Computing isogeny volcanoes of composite degree
Dustin Moody
2011
Corpus ID: 15129567
Isogeny volcanoes are an interesting structure that have had several recent applications. An isogeny volcano is a connected…
Expand
2010
2010
Alberta Number Theory Days - L-functions
Paul Buckingham
2010
Corpus ID: 16659222
Alberta Number Theory Days fell at the very start of the newly formed PIMS CRG in Number Theory, and was thus an excellent…
Expand
2009
2009
On Avoiding ZVP-Attacks Using Isogeny Volcanoes
J. M. Miret
,
D. Sadornil
,
J. Tena
,
R. Tomàs
,
M. Valls
Web Information System and Application Conference
2009
Corpus ID: 11265338
The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one…
Expand
2007
2007
Generació de volcans de 7-isogènies de corbes el·líptiques
Albert Ventura Aresté
2007
Corpus ID: 192053167
En aquest treball hem desenvolupat un algorisme que donada una corba el·liptica amb punts d'ordre 7 genera el volca de 7…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE