Publication:

An Efficient Key Recovery Attack on SIDH

 
dc.contributor.authorCastryck, Wouter
dc.contributor.authorDecru, Thomas
dc.date.accessioned2024-09-30T09:33:10Z
dc.date.available2024-09-07T18:22:06Z
dc.date.available2024-09-30T09:33:10Z
dc.date.issued2023
dc.description.wosFundingTextThis work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT - No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203.
dc.identifier.doi10.1007/978-3-031-30589-4_15
dc.identifier.eisbn978-3-031-30589-4
dc.identifier.isbn978-3-031-30588-7
dc.identifier.issn0302-9743
dc.identifier.urihttps://imec-publications.be/handle/20.500.12860/44427
dc.publisherSPRINGER INTERNATIONAL PUBLISHING AG
dc.source.beginpage423
dc.source.conference42nd Annual International Conference on Theory and Applications of Cryptographic Techniques (Eurocrypt)
dc.source.conferencedateAPR 23-27, 2023
dc.source.conferencelocationLyon
dc.source.endpage447
dc.source.journalLecture Notes in Computer Science
dc.source.numberofpages25
dc.source.volume14008
dc.subject.keywordsGENUS 2
dc.subject.keywordsJACOBIANS
dc.subject.keywordsCURVES
dc.title

An Efficient Key Recovery Attack on SIDH

dc.typeProceedings paper
dspace.entity.typePublication
Files
Publication available in collections: