Zero Knowledge cover image

Discovering New Elliptic Curves with Antonio Sanso and Youssef El Housni

Zero Knowledge

CHAPTER

Discussion on Post-Quantum Key Exchange Vulnerabilities and Elliptic Curve Collaboration

The chapter addresses the vulnerability of the IDH key exchange primitive to attacks on standard computers despite its quantum-resistant properties. It introduces the C-side scheme as a secure alternative based on isogenous cryptography for post-quantum scenarios, along with insights into collaboration on elliptic curves.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner