Quantum Security Analysis of CSIDH

Quantum Security Analysis of CSIDH

TheIACR via YouTube Direct link

CSIDH in practice

4 of 20

4 of 20

CSIDH in practice

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Quantum Security Analysis of CSIDH

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 CSIDH: A Hard Homogeneous Space Key Echange
  3. 3 Key exchange from HHS
  4. 4 CSIDH in practice
  5. 5 CSIDH security
  6. 6 Cryptanalysis principles
  7. 7 Cost model
  8. 8 Implementing the CSIDH oracle
  9. 9 Quantum oracle cost
  10. 10 Hidden shift problem
  11. 11 Labeled qubits (in Z/(2 ))
  12. 12 Combining qubits
  13. 13 Kuperberg's first algorithm [Kup05]
  14. 14 Summary
  15. 15 Use on CSIDH
  16. 16 Regev's variant Reg04
  17. 17 Pipeline of routines
  18. 18 New tradeoffs
  19. 19 Safe instances
  20. 20 Conclusion

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.