Torsion point attacks on 'SIDH-like' cryptosystems (2022)
Attributed to:
Isogeny-based cryptography: from theory to practice
funded by
EPSRC
Abstract
No abstract provided
Bibliographic Information
Digital Object Identifier: http://dx.doi.org/10.1049/ise2.12076
Publication URI: http://dx.doi.org/10.1049/ise2.12076
Type: Journal Article/Review
Parent Publication: IET Information Security
Issue: 2