About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Wireless Internet. 15th EAI International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings

Research Article

Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-27041-3_2,
        author={Miraz Uz Zaman and Aaron Hutchinson and Manki Min},
        title={Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function},
        proceedings={Wireless Internet. 15th EAI International Conference, WiCON 2022, Virtual Event, November 2022, Proceedings},
        proceedings_a={WICON},
        year={2023},
        month={2},
        keywords={Post-quantum cryptography Supersingular isogeny Hash CGL Elliptic curves Weierstrass Montgomery Legendre},
        doi={10.1007/978-3-031-27041-3_2}
    }
    
  • Miraz Uz Zaman
    Aaron Hutchinson
    Manki Min
    Year: 2023
    Implementation Aspects of Supersingular Isogeny-Based Cryptographic Hash Function
    WICON
    Springer
    DOI: 10.1007/978-3-031-27041-3_2
Miraz Uz Zaman1,*, Aaron Hutchinson1, Manki Min1
  • 1: Louisiana Tech University, 71272
*Contact email: muz001@latech.edu

Abstract

Supersingular isogeny-based cryptosystems are considered an attractive candidate for the post-quantum cryptographic world due to their smaller key sizes. Based on the traversal in a supersingular isogeny graph (expander graph), Charles, Goren, and Lauter proposed a cryptographic hash function also known as CGL hash. In this paper, we present our study on the implementation-related aspects of the compact variation of the standard CGL hash function using different forms of elliptic curves (Weierstrass, Montgomery, and Legendre). Moreover, we show that some redundant computations in the original propositions of the CGL hash function can be avoided by utilizing the unique characteristics of the different forms of the elliptic curve. We also compared the running time and the total number of collisions through the experiments with the implemented algorithms.

Keywords
Post-quantum cryptography Supersingular isogeny Hash CGL Elliptic curves Weierstrass Montgomery Legendre
Published
2023-02-18
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-27041-3_2
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL