×
Nov 19, 2020 · This work presents a detailed study of the classical security of the post-quantum supersingular isogeny key encapsulation (SIKE) protocol using a realistic ...
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. Authors: Patrick Longa. Patrick Longa. Microsoft Research, Redmond, USA.
Aug 11, 2021 · The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. Conference paper; First Online: 11 August 2021. pp 402–431 ...
Improved cost model and analysis of the SIKE protocol indicates that the current SIKE parameters have higher practical security than currently believed, ...
Request PDF | The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3 | This work presents a detailed study of the classical ...
Patrick Longa, Wen Wang, and Jakub Szefer, "The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3", in Proceedings of the ...
The model considers both computing and memory costs, together with historical price data and the use of a conservative projection of future costs.
The cost to break SIKE: A comparative hardware-based analysis with AES and SHA-3. Contributed talk at CRYPTO 2021, virtual conference, August 2021 ...
The cost to break SIKE: A comparative hardware-based analysis with AES and SHA-3, Nov. 2020. Published in CRYPTO 2021. Hiroshi Onuki, Yusuke Aikawa and ...