Public-key cryptography provides security for digital systems and communication. Tradi-tional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.
CITATION STYLE
Drzazga, B., & Krzywiecki, Ł. (2022, June 1). Review of Chosen Isogeny-Based Cryptographic Schemes. Cryptography. MDPI. https://doi.org/10.3390/cryptography6020027
Mendeley helps you to discover research relevant for your work.