Review of Chosen Isogeny-Based Cryptographic Schemes

3Citations
Citations of this article
10Readers
Mendeley users who have this article in their library.

Abstract

Public-key cryptography provides security for digital systems and communication. Tradi-tional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks. However, Shor’s algorithm suited for quantum computers can break the bedrock of most currently used systems, i.e., the RSA problem and discrete logarithm problem. Post-quantum cryptography can withstand attacks carried out by quantum computers. Several families of post-quantum systems exist; one of them is isogeny-based cryptography. As a main contribution, in this paper, we provide a survey of chosen, fundamental isogeny-based schemes. The target audience of this review is researchers interested in practical aspects of this field of cryptography; therefore the survey contains exemplary implementations. Our goal was not to develop an efficient implementation, but to provide materials that make it easier to analyze isogeny-based cryptography.

Cite

CITATION STYLE

APA

Drzazga, B., & Krzywiecki, Ł. (2022, June 1). Review of Chosen Isogeny-Based Cryptographic Schemes. Cryptography. MDPI. https://doi.org/10.3390/cryptography6020027

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free