Cryptographic Migration & Agility
  • About Cryptographic Migration & Agility
  • Category Overview
  • Projects and Initiatives
  • Libraries and Interfaces
  • Home
  • English
    Chinese
English
Chinese
  • Cryptographic Migration & Agility
    • About Cryptographic Migration & Agility
    • Category Overview
    • PQC Migration Overview
    • Related Work
    • Scheme Development
      • NIST PQC Algorithms
        • BIKE
        • CRYSTALS-Dilithium
        • Falcon
        • FrodoKEM
        • GeMSS
        • HQC
        • CRYSTALS-Kyber
        • Classic McEliece
        • NTRU
        • Picnic
        • NTRU-Prime
        • Rainbow
        • SABER
        • SIKE
        • SPHINCS+
      • Code-Based Schemes
      • Hash-Based Schemes
      • Lattice-Based Schemes
      • Multivariate-Based Schemes
      • Isogeny-Based Schemes
      • Other Development Efforts
    • Security Analysis
      • Cryptanalysis
      • Side-Channel Attacks
    • Evaluations & Integrations
      • Hardware Evaluations
        • General
        • FPGA Evaluations
        • Embedded Evaluations
        • IoT Evaluations
        • Automotive Evaluations
        • Micro-Controller Evaluations
      • Security Protocols & Applications
        • MACsec
        • CHAP/PAP
        • IPsec/IKEv2
        • TLS/SSL
        • DTLS
        • SRTP/ZRTP
        • Signal Protocol
        • SSH
        • Virtual Private Network (VPN)
        • DNSSEC
        • S/MIME
        • PGP/GPG
        • Kerberos
        • Single Sign-On
        • SFTP
        • Public Key Infrastructure (PKI) & Certificate
        • Distributed Ledger (Blockchain)
        • Wireless Networks
        • Onion Routing & Tor Network
        • eIDs
        • Others
    • Migration
      • Approaches & Strategies
      • Testing & Automation
      • Standards & Drafts
    • Cryptographic Agility
      • Approaches & Strategies
    • Projects and Initiatives
    • Libraries and Interfaces
    • References
    • How to Contribute
    • Contributors
  1. Cryptographic Migration & Agility
  2. Scheme Development
  3. Isogeny-Based Schemes

Isogeny-Based Schemes

  • A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies: [L18]
  • CSI-RAShi: Distributed key generation for CSIDH.: [BDP20]
  • CSIDH on the surface: [CD20]
  • CSIDH: An Efficient Post-Quantum Commutative Group Action: [CLM18]
  • CTIDH: faster constant-time CSIDH: [BBC21]
  • Memory Optimization Techniques for Computing Discrete Logarithms in Compressed SIKE.: [HKP21]
  • PQDH: A Quantum-Safe Replacement for Diffie-Hellman based on SIDH: [SH19]
  • Post-quantum Group Key Agreement Scheme: [BZ21]
  • Pre- and Post-quantum Diffie–Hellman from Groups, Actions, and Isogenies \textbar SpringerLink: [S18]
  • Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange: [FTT18]
  • The Case for SIKE: A Decade of the Supersingular Isogeny Problem: [C21]
Last modified February 12, 2022

© 2022 Darmstadt University of Applied Sciences
Impress