All Stories

  1. Influences of some families of error-correcting codes
  2. Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
  3. Masking Countermeasures Against Side-Channel Attacks on Quantum Computers
  4. CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
  5. A faster method for fault attack resistance in static/ephemeral CSIDH
  6. $$\mathsf {CSI\text {-}Otter}$$: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist
  7. Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies
  8. A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
  9. Cryptanalysis of “MAKE”
  10. An adaptive attack on 2-SIDH
  11. (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
  12. Towards Isogeny-Based Password-Authenticated Key Establishment
  13. An adaptive attack on 2-SIDH
  14. A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
  15. Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors
  16. How Not to Create an Isogeny-Based PAKE
  17. Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs