A Polynomial-Time Attack on G2SIDH

G Zhou, M Xu - International Conference on Information and …, 2023 - Springer
… ’s G2SIDH, we construct two attack algorithms that can recover the secret key in polynomial
time. … Finally, we conclude three types of polynomial-time attacks on high-dimensional SIDH. …

Check for A Polynomial-Time Attack on G2SIDH Guoqing Zhou and Maozhi Xu () School of Mathematical Sciences, Peking University, Beijing, China mzxu@ math …

G Zhou, M Xu - … , ICICS 2023, Tianjin, China, November 18–20 …, 2023 - books.google.com
… Ti's G2SIDH, we construct two attack algorithms that can recover the secret key in polynomial
time… Finally, we conclude three types of polynomial-time attacks on high-dimensional SIDH. …

[PDF][PDF] An adaptive attack on Genus-2 SIDH.

S Kunzweiler, YB Ti, C Weitkämper - IACR Cryptol. ePrint Arch., 2021 - scholar.archive.org
… a polynomial-time adaptive attack on the genus-2 variant of the SIDH protocol (G2SIDH) …
One of the contributions of this paper is to demonstrate an adaptive attack on G2SIDH which …

Secret keys in genus-2 SIDH

S Kunzweiler, YB Ti, C Weitkämper - International Conference on Selected …, 2021 - Springer
… We present a polynomial-time adaptive attack on the genus-2 variant of SIDH (G2SIDH) and
… One of the contributions of this paper is to demonstrate an adaptive attack on G2SIDH which …

Generalising Fault Attacks to Genus Two Isogeny Cryptosystems

A Goh, CW Lim, YB Ti - 2022 Workshop on Fault Detection and …, 2022 - ieeexplore.ieee.org
… sketching out the G2SIDH protocol in Section IC. Next, the generalisation of Ti’s fault attack
to G2SIDH will be detailed in Section II, and we provide an analysis of this attack in Section III…

A Note on constructing SIDH-pok-based signatures after castryck-decru attack

JJ Chi-Domínguez - Cryptology ePrint Archive, 2022 - eprint.iacr.org
G2SIDH; we took it as a black box. However, we mention the main differences between SIDH
and G2SIDH … All the above calculations can be done in polynomial time in the variable n = …

[HTML][HTML] Efficiently detecting splittings and the application to the dimension 2 isogeny problem

MCR Santos - mariascrs.com
… isogeny problem with torsion point information can be solved in polynomial time [11],
thus making primitives such as the dimension 2 analogue of SIDH, G2SIDH [8], insecure. …

Efficient computation of -isogenies

S Kunzweiler - Designs, Codes and Cryptography, 2024 - Springer
… Since the preparation of this work predates the publications of the attacks on SIDH, the
main application we had in mind was the G2SIDH protocol [12], where our algorithm can be …

Cryptanalysis of Isogeny-based Protocols in Genus 1 and 2

C Weitkämper - 2023 - etheses.bham.ac.uk
… Secondly, we present a polynomial-time adaptive attack on … key generation algorithm for
G2SIDH which allows for uniform … Secondly, Robert shows that polynomial-time attacks can (…

Design and analysis of isogeny-based static-key protocols

A Basso - 2024 - etheses.bham.ac.uk
… We introduce a polynomial-time attack on the onemore … attack; we also propose a second
attack that achieves the same goals but cannot be easily defended against. The second attack, …