Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Panny, Lorenz"'
Autor:
de Quehen, Victoria, Kutas, Péter, Leonardi, Chris, Martindale, Chloe, Panny, Lorenz, Petit, Christophe, Stange, Katherine E.
SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies between supersingular elliptic curves. However, SIDH and related cryptosystems also reveal additional information: the restriction of a secret isogeny
Externí odkaz:
http://arxiv.org/abs/2005.14681
Publikováno v:
Mathematical Cryptology, Florida Online Journals, 2021, 1 (1), pp.40-44
In this short note we give a polynomial-time quantum reduction from the vectorization problem (DLP) to the parallelization problem (CDHP) for group actions. Combined with the trivial reduction from par-allelization to vectorization, we thus prove the
Externí odkaz:
http://arxiv.org/abs/1812.09116
Autor:
de Feo, Luca, Fouotsa, Tako, Kutas, Péter, Leroux, Antonin, Merz, Simon-Philipp, Panny, Lorenz, Wesolowski, Benjamin
Publikováno v:
PKC 2023
PKC 2023, May 2023, Atlanta, United States
PKC 2023, May 2023, Atlanta, United States
International audience; We present SCALLOP: SCALable isogeny action based on Oriented supersingular curves with Prime conductor, a new group action based on isogenies of supersingular curves. Similarly to CSIDH and OSIDH, we use the group action of a
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::65cab9f8829084d23a0d80045c809dc4
https://inria.hal.science/hal-04052532/document
https://inria.hal.science/hal-04052532/document
Publikováno v:
Eurocrypt 2023
Eurocrypt 2023, Apr 2023, Lyon, France
Eurocrypt 2023, Apr 2023, Lyon, France
International audience; We present an attack on SIDH utilising isogenies between polarized products of two supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered independently from [8]) has subexponential compl
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::af27b771b234151dd0abfdcd00458e39
https://hal.science/hal-04023441/document
https://hal.science/hal-04023441/document
Autor:
Banegas, Gustavo, Krämer, Juliane, Lange, Tanja, Meyer, Michael, Panny, Lorenz, Reijnders, Krijn, Sotáková, Jana, Trimoska, Monika
We investigate a new class of fault-injection attacks against the CSIDH family of cryptographic group actions. Our disorientation attacks effectively flip the direction of some isogeny steps. We achieve this by faulting a specific subroutine, connect
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::d0a19d8ba0b23d21adac65d282af3321
https://hal.science/hal-03970597v2/document
https://hal.science/hal-03970597v2/document
Autor:
de Quehen, Victoria, Kutas, Péter, Leonardi, Chris, Martindale, Chloe, Panny, Lorenz, Petit, Christophe, Stange, Katherine K.E.
Publikováno v:
Lecture notes in computer science, 12827 LNCS
SIDH is a post-quantum key exchange algorithm based on the presumed difficulty of finding isogenies between supersingular elliptic curves. However, SIDH and related cryptosystems also reveal additional information: the restriction of a secret isogeny
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=od______2101::4477803160f70c47113b7fa744d1c8ee
http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/332219
http://hdl.handle.net/2013/ULB-DIPOT:oai:dipot.ulb.ac.be:2013/332219
Autor:
Bernstein, Daniel J., Lange, Tanja, Martindale, Chloe, Panny, Lorenz, Rijmen, Vincent, Ishai, Yuval
Publikováno v:
Advances in Cryptology – EUROCRYPT 2019 ISBN: 9783030176556
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, 409-441
STARTPAGE=409;ENDPAGE=441;TITLE=Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
EUROCRYPT (2)
Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings, 409-441
STARTPAGE=409;ENDPAGE=441;TITLE=Advances in Cryptology – EUROCRYPT 2019-38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
Choosing safe post-quantum parameters for the new CSIDH isogeny-based key-exchange system requires concrete analysis of the cost of quantum attacks. The two main contributions to attack cost are the number of queries in hidden-shift algorithms and th
Autor:
Beullens, Ward, D'Anvers, Jan-Pieter, Hülsing, Andreas T., Lange, Tanja, Panny, Lorenz, de Saint Guilhem, Cyprien, Smart, Nigel P.
This study provides an overview of the current state of affairs on the standardization process of Post-Quantum Cryptography (PQC). It presents the 5 main families of PQ algorithms; viz. code-based, isogeny-based, hash-based, lattice-based and multiva
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::31cfde1a9efdfea1559cfd227874d047
https://research.tue.nl/nl/publications/ad93d053-a85c-4ace-bdd4-9cbe1a75d6bd
https://research.tue.nl/nl/publications/ad93d053-a85c-4ace-bdd4-9cbe1a75d6bd
Autor:
Panny, Lorenz
Publikováno v:
Mathematical Cryptology, 0(1), 1-7
We (once again) refute recurring claims about a public-key encryption scheme that allegedly provides unconditional security. This is approached from two angles: We give an information-theoretic proof of impossibility, as well as a concrete attack bre
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=narcis______::2921dc8ce7b11df9ea3e7331ac9b7fda
https://research.tue.nl/nl/publications/cef45462-83b6-4614-b932-34b4b9d6fe2c
https://research.tue.nl/nl/publications/cef45462-83b6-4614-b932-34b4b9d6fe2c