{"id":"https://openalex.org/W4404056867","doi":"https://doi.org/10.1109/access.2024.3491790","title":"Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions","display_name":"Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions","publication_year":2024,"publication_date":"2024-01-01","ids":{"openalex":"https://openalex.org/W4404056867","doi":"https://doi.org/10.1109/access.2024.3491790"},"language":"en","primary_location":{"id":"doi:10.1109/access.2024.3491790","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3491790","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"http://dx.doi.org/10.1109/access.2024.3491790","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017137785","display_name":"Donghoe Heo","orcid":"https://orcid.org/0000-0001-9300-2985"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Donghoe Heo","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-9300-2985","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jeonghwan Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeonghwan Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103252102","display_name":"Taehoon Kang","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Taehoon Kang","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5038203494","display_name":"Suhri Kim","orcid":"https://orcid.org/0000-0003-2665-7142"},"institutions":[{"id":"https://openalex.org/I165677929","display_name":"Sungshin Women's University","ror":"https://ror.org/0500xzf72","country_code":"KR","type":"education","lineage":["https://openalex.org/I165677929"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Suhri Kim","raw_affiliation_strings":["School of Mathematics, Statistics, and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea","School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0003-2665-7142","affiliations":[{"raw_affiliation_string":"School of Mathematics, Statistics, and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]},{"raw_affiliation_string":"School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5078931547","display_name":"Seokhie Hong","orcid":"https://orcid.org/0000-0001-7506-4023"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Seokhie Hong","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0001-7506-4023","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5017137785"],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21136617,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":null,"first_page":"162870","last_page":"162881"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8443999886512756,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.8443999886512756,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12016","display_name":"Web Data Mining and Analysis","score":0.7243000268936157,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.6815999746322632,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/isogeny","display_name":"Isogeny","score":0.8820722103118896},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6282975673675537},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6106377840042114},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4184283912181854},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.29393720626831055},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.2548995018005371},{"id":"https://openalex.org/keywords/elliptic-curve","display_name":"Elliptic curve","score":0.13265129923820496},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.12305369973182678}],"concepts":[{"id":"https://openalex.org/C2779765290","wikidata":"https://www.wikidata.org/wiki/Q1674414","display_name":"Isogeny","level":3,"score":0.8820722103118896},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6282975673675537},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6106377840042114},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4184283912181854},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.29393720626831055},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.2548995018005371},{"id":"https://openalex.org/C179603306","wikidata":"https://www.wikidata.org/wiki/Q268493","display_name":"Elliptic curve","level":2,"score":0.13265129923820496},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.12305369973182678},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2024.3491790","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3491790","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:438eac76cf3a460fa16af6c740329f54","is_oa":true,"landing_page_url":"https://doaj.org/article/438eac76cf3a460fa16af6c740329f54","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 12, Pp 162870-162881 (2024)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2024.3491790","is_oa":true,"landing_page_url":"http://dx.doi.org/10.1109/access.2024.3491790","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G8893679425","display_name":null,"funder_award_id":"NRF-2020R1A2C1011769","funder_id":"https://openalex.org/F4320322120","funder_display_name":"National Research Foundation of Korea"}],"funders":[{"id":"https://openalex.org/F4320322120","display_name":"National Research Foundation of Korea","ror":"https://ror.org/013aysd81"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W43667552","https://openalex.org/W1549228503","https://openalex.org/W1566345534","https://openalex.org/W1583471030","https://openalex.org/W1656731780","https://openalex.org/W2000932900","https://openalex.org/W2111465179","https://openalex.org/W2162128145","https://openalex.org/W2592544948","https://openalex.org/W2626863351","https://openalex.org/W2763802695","https://openalex.org/W2791851483","https://openalex.org/W2794462176","https://openalex.org/W2794534772","https://openalex.org/W2921362787","https://openalex.org/W2971343499","https://openalex.org/W3129427192","https://openalex.org/W4223945836","https://openalex.org/W4392159292","https://openalex.org/W4392753812","https://openalex.org/W4399015500","https://openalex.org/W6610036892","https://openalex.org/W6764256382","https://openalex.org/W6768591304"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W3097454540","https://openalex.org/W2949868757","https://openalex.org/W3165502361","https://openalex.org/W4302370234","https://openalex.org/W2951061117","https://openalex.org/W3137547215","https://openalex.org/W2069055256"],"abstract_inverted_index":{"This":[0,66,184],"paper":[1,67,156,185],"analyzes":[2,68],"the":[3,8,29,45,49,60,73,76,108,113,120,136,141,144,164,215,219,230,260,267,278],"security":[4,109,137,232],"and":[5,22,24,35,82,84,110,124,129,149,205,249],"performance":[6,111],"of":[7,48,112,143,217,280],"isogeny-based":[9,13,92],"hash":[10,14,31,56,93],"functions.":[11],"The":[12,152,224],"function":[15,94],"was":[16,138],"first":[17],"proposed":[18,78,114],"by":[19,79,122],"Charles,":[20],"Goren,":[21],"Lauter,":[23],"is":[25,52,266],"referred":[26],"to":[27,192,277],"as":[28],"CGL":[30],"function.":[32],"However,":[33,167],"Lauter":[34],"Petit":[36],"demonstrated":[37,173],"that":[38,58,71,158,174,228],"a":[39,90,199,235,281],"collision":[40,147,175],"could":[41,177],"be":[42,178,257],"found":[43,179],"if":[44],"endomorphism":[46],"ring":[47],"starting":[50],"curve":[51],"known.":[53],"Subsequently,":[54],"isogeny":[55],"functions":[57],"mitigate":[59],"Lauter-Petit":[61,74,145,165],"attack":[62],"have":[63],"been":[64],"proposed.":[65],"three":[69,160,220],"methods":[70,77,121],"counter":[72,163],"attack:":[75],"Panny,":[80],"Zaman":[81,123],"Min,":[83],"Larsson.":[85],"In":[86],"particular,":[87],"we":[88,172],"propose":[89],"new":[91],"<monospace":[95,115,169,194,202,206,241,252,271],"xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"":[96,116,127,132,170,195,203,207,242,247,253,264,272],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SHH</monospace>,":[97],"which":[98],"exploits":[99],"Panny\u2019s":[100],"method":[101],"with":[102,119,180],"Hessian":[103],"curves.":[104],"We":[105,212],"then":[106],"analyze":[107],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SHH</monospace>":[117,273],"along":[118],"Min":[125],"(<monospace":[126,131],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SCH</monospace>)":[128],"Larsson":[130],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SLH</monospace>).":[133],"More":[134],"specifically,":[135],"analyzed":[139],"in":[140,154,222],"context":[142],"attack,":[146],"resistance,":[148],"fault":[150],"tolerance.":[151],"analysis":[153],"this":[155],"shows":[157],"all":[159],"algorithms":[161,221],"can":[162,256],"attack.":[166],"for":[168,189,240,245,251],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SCH</monospace>,":[171,243],"pairs":[176],"carelessly":[181],"chosen":[182],"parameters.":[183],"also":[186,213],"provides":[187],"guidelines":[188],"selecting":[190],"parameters":[191],"make":[193],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SCH</monospace>":[196,204],"collision-resistant.":[197],"From":[198],"fault-tolerance":[200],"perspective,":[201],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SLH</monospace>":[208,265],"are":[209],"not":[210],"fault-tolerant.":[211],"present":[214],"results":[216,226],"implementing":[218],"SageMath.":[223],"implementation":[225,261],"show":[227],"at":[229],"128-bit":[231],"level,":[233],"hashing":[234],"256-bit":[236],"message":[237],"takes":[238],"0.130s":[239],"0.125s":[244],"projective-<monospace":[246,263],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SLH</monospace>,":[248],"0.162s":[250],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">SHH</monospace>.":[254],"As":[255],"seen":[258],"from":[259],"results,":[262],"most":[268],"efficient,":[269],"while":[270],"performs":[274],"slower":[275],"due":[276],"use":[279],"larger":[282],"finite":[283],"field.":[284]},"counts_by_year":[],"updated_date":"2025-12-19T19:40:27.379048","created_date":"2025-10-10T00:00:00"}
