{"id":"https://openalex.org/W7138002078","doi":"https://doi.org/10.1109/access.2026.3674870","title":"Efficient Constant-Time Implementation of terSIDH","display_name":"Efficient Constant-Time Implementation of terSIDH","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7138002078","doi":"https://doi.org/10.1109/access.2026.3674870"},"language":"en","primary_location":{"id":"doi:10.1109/access.2026.3674870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3674870","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2026.3674870","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Taehun Kang","orcid":"https://orcid.org/0009-0004-6652-0786"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Taehun Kang","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0009-0004-6652-0786","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5017137785","display_name":"Donghoe Heo","orcid":"https://orcid.org/0000-0001-9300-2985"},"institutions":[{"id":"https://openalex.org/I2801036362","display_name":"Agency for Defense Development","ror":"https://ror.org/05fhe0r85","country_code":"KR","type":"government","lineage":["https://openalex.org/I1327899338","https://openalex.org/I1344042128","https://openalex.org/I2801036362","https://openalex.org/I2801339556"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Donghoe Heo","raw_affiliation_strings":["Agency for Defense Development, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Agency for Defense Development, Seoul, South Korea","institution_ids":["https://openalex.org/I2801036362"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jeonghwan Lee","orcid":"https://orcid.org/0009-0004-0957-5051"},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Jeonghwan Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0009-0004-0957-5051","affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129693595","display_name":"Suhri Kim","orcid":null},"institutions":[{"id":"https://openalex.org/I165677929","display_name":"Sungshin Women's University","ror":"https://ror.org/0500xzf72","country_code":"KR","type":"education","lineage":["https://openalex.org/I165677929"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Suhri Kim","raw_affiliation_strings":["School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea"],"raw_orcid":"https://orcid.org/0000-0003-2665-7142","affiliations":[{"raw_affiliation_string":"School of Mathematics, Statistics and Data Science, Sungshin Women&#x2019;s University, Seoul, South Korea","institution_ids":["https://openalex.org/I165677929"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129649301","display_name":"Changmin Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I197347611","display_name":"Korea University","ror":"https://ror.org/047dqcg40","country_code":"KR","type":"education","lineage":["https://openalex.org/I197347611"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Changmin Lee","raw_affiliation_strings":["School of Cybersecurity, Korea University, Seoul, South Korea"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cybersecurity, Korea University, Seoul, South Korea","institution_ids":["https://openalex.org/I197347611"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I197347611"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.63629684,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"14","issue":null,"first_page":"44607","last_page":"44616"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11416","display_name":"Numerical methods for differential equations","score":0.0697999969124794,"subfield":{"id":"https://openalex.org/subfields/2612","display_name":"Numerical Analysis"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11416","display_name":"Numerical methods for differential equations","score":0.0697999969124794,"subfield":{"id":"https://openalex.org/subfields/2612","display_name":"Numerical Analysis"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10244","display_name":"Chaos control and synchronization","score":0.021800000220537186,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10100","display_name":"Metaheuristic Optimization Algorithms Research","score":0.015799999237060547,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/isogeny","display_name":"Isogeny","score":0.9735999703407288},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5339999794960022},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4970000088214874},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.45170000195503235},{"id":"https://openalex.org/keywords/key-exchange","display_name":"Key exchange","score":0.4417000114917755},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.4235000014305115},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.41780000925064087}],"concepts":[{"id":"https://openalex.org/C2779765290","wikidata":"https://www.wikidata.org/wiki/Q1674414","display_name":"Isogeny","level":3,"score":0.9735999703407288},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7609000205993652},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5339999794960022},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4970000088214874},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.45170000195503235},{"id":"https://openalex.org/C99674996","wikidata":"https://www.wikidata.org/wiki/Q1414155","display_name":"Key exchange","level":4,"score":0.4417000114917755},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.4284999966621399},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.4235000014305115},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.41780000925064087},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.3736000061035156},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.34220001101493835},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3386000096797943},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3244999945163727},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.3034999966621399},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.29429998993873596},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.2818000018596649},{"id":"https://openalex.org/C2989134064","wikidata":"https://www.wikidata.org/wiki/Q288510","display_name":"Execution time","level":2,"score":0.2784000039100647},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.26190000772476196},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.26159998774528503},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.25029999017715454}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2026.3674870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3674870","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:3497ba9b19dd410b9fc74d3e5ad5ec1a","is_oa":true,"landing_page_url":"https://doaj.org/article/3497ba9b19dd410b9fc74d3e5ad5ec1a","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 14, Pp 44607-44616 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2026.3674870","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2026.3674870","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Since":[0,116],"supersingular":[1],"isogeny":[2,47,76,90],"Diffie-Hellman":[3],"(SIDH)":[4],"was":[5,17],"broken":[6],"by":[7],"a":[8,40,172],"polynomial-time":[9],"attack,":[10],"several":[11],"countermeasures":[12,118],"were":[13],"proposed":[14,151],"as":[15,19,158],"it":[16,38,60],"regarded":[18],"the":[20,50,70,113,136,150,161],"most":[21],"efficient":[22],"algorithm":[23],"among":[24],"isogeny-based":[25,174],"cryptosystems.":[26],"Among":[27],"them,":[28],"terSIDH":[29,53],"has":[30],"been":[31],"highlighted":[32],"for":[33,74,98],"its":[34],"high":[35],"performance,":[36],"yet":[37],"exposes":[39],"side-channel":[41],"vulnerability.":[42],"The":[43],"total":[44],"degree":[45],"of":[46,142,164],"depends":[48],"on":[49,148],"private":[51],"key;":[52],"exhibits":[54],"timing":[55,63],"variations":[56],"during":[57],"computation,":[58],"making":[59],"vulnerable":[61],"to":[62,129,154],"attacks.":[64],"In":[65],"this":[66,131],"work,":[67],"we":[68,85,123,134],"present":[69],"first":[71,137],"constant-time":[72,117,182,193],"design":[73],"artificially-oriented":[75],"protocols,":[77],"instantiated":[78],"with":[79,178],"terSIDH.":[80,143],"By":[81],"inserting":[82],"dummy":[83,106],"operations,":[84],"remove":[86],"private-key":[87],"dependencies":[88],"in":[89],"computations":[91],"and":[92,108,160,195],"ensure":[93],"constant":[94],"execution":[95],"time.":[96],"Specifically":[97],"terSIDH,":[99,149],"our":[100,145,168],"method":[101,169],"equalizes":[102],"per-prime":[103],"work":[104],"using":[105],"kernels":[107],"removes":[109],"secret-dependent":[110],"branches":[111],"at":[112],"code":[114],"level.":[115],"typically":[119],"incur":[120],"performance":[121],"overhead,":[122],"introduce":[124],"an":[125],"additional":[126],"optimization":[127],"technique":[128,152],"mitigate":[130],"cost.":[132],"Furthermore,":[133],"provide":[135],"128-bit":[138,179],"secure":[139],"C":[140],"implementation":[141],"Although":[144],"focus":[146],"is":[147,185],"generalizes":[153],"related":[155],"schemes":[156],"such":[157],"binSIDH":[159],"terSIDH-like":[162],"component":[163],"terSIDH-hyb.":[165],"We":[166],"compared":[167],"against":[170],"CSIDH-4096,":[171,194],"representative":[173],"key":[175,183],"exchange":[176],"protocol":[177],"security.":[180],"Our":[181],"generation":[184],"<inline-formula>":[186,196],"<tex-math":[187,197],"notation=\"LaTeX\">$3.3\\times":[188],"$":[189],"</tex-math></inline-formula>":[190],"faster":[191,201],"than":[192,202],"notation=\"LaTeX\">$\\approx":[198],"11$":[199],"</tex-math></inline-formula>%":[200],"terSIDH&#x2019;s":[203],"previous":[204],"worst":[205],"case.":[206]},"counts_by_year":[],"updated_date":"2026-03-28T06:11:35.319607","created_date":"2026-03-18T00:00:00"}
