Feb. 15, 2023, 7:42 a.m. |

IACR News www.iacr.org

ePrint Report: Public-key Compression in M-SIDH

Kaizhan Lin, Jianming Lin, Shiping Cai, Weize Wang, Chang-An Zhao


Recently, SIKE was broken by the Castryck-Decru attack in polynomial time. To avoid this attack, Fouotsa proposed a SIDH-like scheme called M-SIDH, which hides the information of auxiliary points. The countermeasure also leads to huge parameter sizes, and correspondingly the public key size is relatively large.


In this paper, we present several new techniques to compress the public key of M-SIDH. Our method to …

attack called compression eprint report information key large parameter public public key report sike size techniques

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Senior Security Engineer

@ Core10 | Nashville, Tennessee, United States - Remote

Security Operations Engineer I

@ Jamf | US Remote

IT Security ISSO Specialist (15.10)

@ OCT Consulting, LLC | Washington, District of Columbia, United States

Compliance Officer

@ Aspire Software | Canada - Remote

Security Operations Center (SOC) - AVP

@ Paytm | Noida, Uttar Pradesh