designing protocol using isogenies (e.g. https://t.co/V2r0DDkSft by @luca_defeo et al). This might have succeeded a bit for the CSIDH setting based on group action but not so well for the SIDH setting that is less flexible (IMHO). 2/3
5,882 followers
616 followers
RT @JordanJamesEtem: Alamati, N., De Feo, L., Montgomery, H., Patranabis, S.: Cryptographic group actions and applications. In: Moriai, S.,…
13,126 followers
Alamati, N., De Feo, L., Montgomery, H., Patranabis, S.: Cryptographic group actions and applications. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 411–439. Springer, Cham (2020). https://t.co/K2naBO8Pcx $JPM $ORCL $MSFT $TSLA
11 followers
Secure delegated quantum computing allows a computationally weak client to outsource an arbitrary quantum computation to an untrusted quantum server in a privacy-preserving manner. #quantumpotential #CyberSecurity