Cited By
View all- Robert D(2025)On the Efficient Representation of IsogeniesNumber-Theoretic Methods in Cryptology10.1007/978-3-031-82380-0_1(3-84)Online publication date: 19-Feb-2025
- Castryck WVercauteren F(2023)A Polynomial Time Attack on Instances of M-SIDH and FESTAAdvances in Cryptology – ASIACRYPT 202310.1007/978-981-99-8739-9_5(127-156)Online publication date: 18-Dec-2023
- Castryck WDecru T(2023)An Efficient Key Recovery Attack on SIDHAdvances in Cryptology – EUROCRYPT 202310.1007/978-3-031-30589-4_15(423-447)Online publication date: 16-Apr-2023
- Show More Cited By