Zero Knowledge cover image

Discovering New Elliptic Curves with Antonio Sanso and Youssef El Housni

Zero Knowledge

00:00

Discussion on Post-Quantum Key Exchange Vulnerabilities and Elliptic Curve Collaboration

The chapter addresses the vulnerability of the IDH key exchange primitive to attacks on standard computers despite its quantum-resistant properties. It introduces the C-side scheme as a secure alternative based on isogenous cryptography for post-quantum scenarios, along with insights into collaboration on elliptic curves.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app