AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Discussion on Post-Quantum Key Exchange Vulnerabilities and Elliptic Curve Collaboration
The chapter addresses the vulnerability of the IDH key exchange primitive to attacks on standard computers despite its quantum-resistant properties. It introduces the C-side scheme as a secure alternative based on isogenous cryptography for post-quantum scenarios, along with insights into collaboration on elliptic curves.