首页|OPTIMAL STRATEGIES FOR CSIDH

OPTIMAL STRATEGIES FOR CSIDH

扫码查看
Since its proposal in Asiacrypt 2018, the commutative isogeny-based key exchange protocol (CSIDH) has spurred considerable attention to improving its performance and re-evaluating its classical and quantum secu-rity guarantees. In this paper we discuss how the optimal strategies employed by the Supersingular Isogeny Diffie-Hellman (SIDH) key agreement protocol can be naturally extended to CSIDH. Furthermore, we report a software li-brary that achieves moderate but noticeable performance speedups when com-pared against state-of-the-art implementations of CSIDH-512, which is the most popular CSIDH instantiation. We also report an estimated number of field operations for larger instantiations of this protocol, namely, CSIDH-1024 and CSIDH-1792.

Isogeny-based cryptographypost-quantum cryptographyCSIDH pro-to colkey-exchange protocolgroup action evaluation

Chi-dominguez, Jesus-javier、Rodriguez-henriquez, Francisco

展开 >

Tampere Univ

Cinvestav IPN

2022

Advances in mathematics of communications

Advances in mathematics of communications

SCI
ISSN:1930-5346
年,卷(期):2022.16(2)
  • 5
  • 24