Результаты исследований: Научные публикации в периодических изданиях › статья › Рецензирование
Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems. / Малыгина, Екатерина Сергеевна; Куценко, Александр Владимирович; Novoselov, S. A. и др.
в: Journal of Applied and Industrial Mathematics, Том 18, № 1, 10, 03.2024, стр. 103-121.Результаты исследований: Научные публикации в периодических изданиях › статья › Рецензирование
}
TY - JOUR
T1 - Post-Quantum Cryptosystems: Open Problems and Current Solutions. Isogeny-Based and Code-Based Cryptosystems
AU - Малыгина, Екатерина Сергеевна
AU - Куценко, Александр Владимирович
AU - Novoselov, S. A.
AU - Kolesnikov, N. S.
AU - Бахарев, Александр Олегович
AU - Хильчук, Ирина Сергеевна
AU - Шапоренко, Александр Сергеевич
AU - Токарева, Наталья Николаевна
N1 - The work of the first, third, and fourth authors was financially supported by the Kovalevskaya North-Western Mathematical Center of Immanuel Kant Baltic Federal University under agreement no. 075–02–2023–934 with the Ministry of Science and Higher Education of the Russian Federation. The work of the second, fifth, sixth, seventh, and eighth authors was financially supported by the Mathematical Center in Akademgorodok under agreement no. 075–15–2022–282 with the Ministry of Science and Higher Education of the Russian Federation.
PY - 2024/3
Y1 - 2024/3
N2 - This paper is a survey of modern post-quantum cryptographic schemes based on codesand isogenies. Special attention is paid to cryptanalysis of these schemes. In particular, forcode-based cryptosystems we describe the information set decoding and the support splittingalgorithm as main attacks, and for cryptosystems based on isogenies we describe in detail theCastryck–Decru attack on SIDH/SIKE.
AB - This paper is a survey of modern post-quantum cryptographic schemes based on codesand isogenies. Special attention is paid to cryptanalysis of these schemes. In particular, forcode-based cryptosystems we describe the information set decoding and the support splittingalgorithm as main attacks, and for cryptosystems based on isogenies we describe in detail theCastryck–Decru attack on SIDH/SIKE.
UR - https://www.scopus.com/record/display.uri?eid=2-s2.0-85191374884&origin=inward&txGid=3b274e23577b3a7018f1082c06f12815
UR - https://elibrary.ru/item.asp?id=67311801
U2 - 10.1134/S1990478924010101
DO - 10.1134/S1990478924010101
M3 - Article
VL - 18
SP - 103
EP - 121
JO - Journal of Applied and Industrial Mathematics
JF - Journal of Applied and Industrial Mathematics
SN - 1990-4789
IS - 1
M1 - 10
ER -
ID: 60747114