all InfoSec news
Low Memory Attacks on Small Key CSIDH
April 10, 2023, 5:54 p.m. |
IACR News www.iacr.org
ePrint Report: Low Memory Attacks on Small Key CSIDH
Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May
Despite recent breakthrough results in attacking SIDH, the CSIDH protocol remains a secure post-quantum key exchange protocol with appealing properties. However, for obtaining efficient CSIDH instantiations one has to resort to small secret keys. In this work, we provide novel methods to analyze small key CSIDH, thereby introducing the representation method ---that has been successfully applied for attacking small secret keys in code- …
attacks code eprint report exchange key keys low may memory novel post-quantum protocol quantum report representation results secret secret keys work world
More from www.iacr.org / IACR News
A Deniability Analysis of Signal's Initial Handshake PQXDH
1 day, 3 hours ago |
www.iacr.org
BGJ15 Revisited: Sieving with Streamed Memory Access
1 day, 3 hours ago |
www.iacr.org
Quantum Key-Revocable Dual-Regev Encryption, Revisited
1 day, 3 hours ago |
www.iacr.org
Jobs in InfoSec / Cybersecurity
Information Security Engineers
@ D. E. Shaw Research | New York City
Technology Security Analyst
@ Halton Region | Oakville, Ontario, Canada
Senior Cyber Security Analyst
@ Valley Water | San Jose, CA
Consultant/Senior Consultant – Categoria Protetta L. 68/99
@ BIP | Italy
SoC Security Architect, Platform Architecture
@ Apple | San Diego, California, United States
Cloud Engineer II- SOC Analyst
@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN