April 10, 2023, 5:54 p.m. |

IACR News www.iacr.org

ePrint Report: Low Memory Attacks on Small Key CSIDH

Jesús-Javier Chi-Domínguez, Andre Esser, Sabrina Kunzweiler, Alexander May


Despite recent breakthrough results in attacking SIDH, the CSIDH protocol remains a secure post-quantum key exchange protocol with appealing properties. However, for obtaining efficient CSIDH instantiations one has to resort to small secret keys. In this work, we provide novel methods to analyze small key CSIDH, thereby introducing the representation method ---that has been successfully applied for attacking small secret keys in code- …

attacks code eprint report exchange key keys low may memory novel post-quantum protocol quantum report representation results secret secret keys work world

Information Security Engineers

@ D. E. Shaw Research | New York City

Technology Security Analyst

@ Halton Region | Oakville, Ontario, Canada

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Consultant/Senior Consultant – Categoria Protetta L. 68/99

@ BIP | Italy

SoC Security Architect, Platform Architecture

@ Apple | San Diego, California, United States

Cloud Engineer II- SOC Analyst

@ Insight Enterprises, Inc. | Gurugram Gurgaon HR, IN