All Stories

  1. Cycles and cuts in supersingular L-isogeny graphs
  2. Influences of some families of error-correcting codes
  3. Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
  4. Masking Countermeasures Against Side-Channel Attacks on Quantum Computers
  5. CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
  6. A faster method for fault attack resistance in static/ephemeral CSIDH
  7. $$\mathsf {CSI\text {-}Otter}$$: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
  8. Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies
  9. A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
  10. Cryptanalysis of “MAKE”
  11. An adaptive attack on 2-SIDH
  12. (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
  13. Towards Isogeny-Based Password-Authenticated Key Establishment
  14. An adaptive attack on 2-SIDH
  15. A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
  16. Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
  17. How Not to Create an Isogeny-Based PAKE
  18. Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs