Information
Authors
- David Jao (University of Waterloo and evolution Q.Inc)
- Reza Azarderakhsh (Florida Atlantic University and PQSecure Technologies LLC)
- Matthew Campagna (Amazon)
- Craig Costello (Microsoft Research)
- Luca De Feo (Université de Versailles – Saint-Quentin)
- Basil Hess (Infosec Global Switzerland)
- Amir Jalali (LinkedIn Corporation)
- Brian Koziel (Texas Instruments)
- Brian LaMacchia (Microsoft Research)
- Patrick Longa (Microsoft Research)
- Michael Naehrig (Microsoft Research)
- Geovandro Pereira (University of Waterloo and evolution Q.Inc)
- Joost Renes (Radboud University)
- Vladimir Soukharev (Infosec Global Canada)
- David Urbanik (University of Toronto)
- Koray Karabina (National Research Council, Canada)
- Aaron Hutchinson (University of Waterloo, Canada)
Official Links
Related Articles
A Compact and Scalable Hardware/Software Co-design of SIKE
Pedro Maat C. Massolino and Patrick Longa and Joost Renes and Lejla Batina.
CHES-2020, 14 Jan 2020.
The Dark SIDH of Isogenies
Paul Bottinelli and Victoria de Quehen and Chris Leonardi and Anton Mosunov and Filip Pawlega and Milap Sheth.
Cryptology ePrint Archive: Report 2019/1333, 19 Nov 2019.
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
Craig Costello.
Cryptology ePrint Archive: Report 2019/1145, 3 Oct 2019.
SIKE'd Up: Fast and Secure Hardware Architectures for Supersingular Isogeny Key Encapsulation
Brian Koziel and A-Bon Ackie and Rami El Khatib and Reza Azarderakhsh and Mehran Mozaffari-Kermani.
Cryptology ePrint Archive: Report 2019/711.
SIKE Round 2 Speed Record on ARM Cortex-M4
Hwajeong soe and Amir Jalali and Reza Azarderakhsh.
Cryptology ePrint Archive: Report 2019/535, 20 May 2019.
Improved Classical Cryptanalysis of SIKE in Practice
Craig Costello and Patrick Longa and Michael Naehrig and Joost Renes and Fernando Virdia.
IACR-PKC-2020.
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange
Hwajeong Seo and Zhe Liu and Patrick Longa and Zhi Hu.
CHES-2018, 2018.
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies
Patrick Longa.
Cryptology ePrint Archive: Report 2018/267, 2018.
Summary Tables
ROUND 1 | |||
---|---|---|---|
Description | isogeny | ||
Assumption | SIDH | ||
Functionality | KEM | ||
Public Key (bytes) |
| ||
Secret Key (bytes) |
| ||
CIPH/SIG (bytes) |
| ||
Security
Type |
IND-CCA (HHK) |
ROUND 2 | |||
---|---|---|---|
SIKE | SIKE_compressed | ||
Description | isogeny | ||
Assumption | SIDH | ||
Functionality | KEM | ||
Public Key
(bytes) |
|
| |
Secret Key
(bytes) |
|
| |
CIPH/SIG
(bytes) |
|
| |
Security
Type |
IND-CCA (HHK) |