{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,24]],"date-time":"2025-11-24T07:15:12Z","timestamp":1763968512010,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T00:00:00Z","timestamp":1667779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["2274580"],"award-info":[{"award-number":["2274580"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,11,7]]},"DOI":"10.1145\/3548606.3563542","type":"proceedings-article","created":{"date-parts":[[2022,11,7]],"date-time":"2022-11-07T11:41:28Z","timestamp":1667821288000},"page":"3327-3329","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Poster"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Basso","sequence":"first","affiliation":[{"name":"University of Birmingham, Birmingham, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92062-3_6"},{"key":"e_1_3_2_1_3_1","volume-title":"An Efficient Key Recovery Attack on SIDH (Preliminary Version). Cryptology ePrint Archive","author":"Castryck Wouter","year":"2022","unstructured":"Wouter Castryck and Thomas Decru . 2022. An Efficient Key Recovery Attack on SIDH (Preliminary Version). Cryptology ePrint Archive ( 2022 ). https:\/\/eprint.iacr.org\/2022\/975. Wouter Castryck and Thomas Decru. 2022. An Efficient Key Recovery Attack on SIDH (Preliminary Version). Cryptology ePrint Archive (2022). https:\/\/eprint.iacr.org\/2022\/975."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9002-x"},{"key":"e_1_3_2_1_5_1","volume-title":"Barreto","author":"Doliskani Javad","year":"2017","unstructured":"Javad Doliskani , Geovandro C. C. F. Pereira , and Paulo S. L. M . Barreto . 2017 . Faster Cryptographic Hash Function From Supersingular Isogeny Graphs. Selected areas in cryptography textendash SAC 2022 (2017). https:\/\/eprint.iacr.org\/2017\/1202. Javad Doliskani, Geovandro C. C. F. Pereira, and Paulo S. L. M. Barreto. 2017. Faster Cryptographic Hash Function From Supersingular Isogeny Graphs. Selected areas in cryptography textendash SAC 2022 (2017). https:\/\/eprint.iacr.org\/2017\/1202."},{"key":"e_1_3_2_1_6_1","unstructured":"Tako Boris Fouotsa. 2022. SIDH with Masked Torsion Point Images. https:\/\/eprint.iacr.org\/2022\/1054.  Tako Boris Fouotsa. 2022. SIDH with Masked Torsion Point Images. https:\/\/eprint.iacr.org\/2022\/1054."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"e_1_3_2_1_8_1","unstructured":"Luciano Maino and Chloe Martindale. 2022. An Attack on SIDH with Arbitrary Starting Curve. Cryptology ePrint Archive Paper 2022\/1026.  Luciano Maino and Chloe Martindale. 2022. An Attack on SIDH with Arbitrary Starting Curve. Cryptology ePrint Archive Paper 2022\/1026."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings. 496--511","author":"Merz Simon-Philipp","year":"2020","unstructured":"Simon-Philipp Merz , Romy Minko , and Christophe Petit . 2020 . Another Look at Some Isogeny Hardness Assumptions. In Topics in Cryptology - CT-RSA 2020 - the Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24--28, 2020 , Proceedings. 496--511 . Simon-Philipp Merz, Romy Minko, and Christophe Petit. 2020. Another Look at Some Isogeny Hardness Assumptions. In Topics in Cryptology - CT-RSA 2020 - the Cryptographers' Track at the RSA Conference 2020, San Francisco, CA, USA, February 24--28, 2020, Proceedings. 496--511."},{"key":"e_1_3_2_1_10_1","unstructured":"Tomoki Moriya. 2022. Masked-Degree SIDH. Cryptology ePrint Archive Paper 2022\/1019.  Tomoki Moriya. 2022. Masked-Degree SIDH. Cryptology ePrint Archive Paper 2022\/1019."},{"key":"e_1_3_2_1_11_1","unstructured":"Damien Robert. 2022. Breaking SIDH in Polynomial Time. Cryptology ePrint Archive Paper 2022\/1038.  Damien Robert. 2022. Breaking SIDH in Polynomial Time. Cryptology ePrint Archive Paper 2022\/1038."}],"event":{"name":"CCS '22: 2022 ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Los Angeles CA USA","acronym":"CCS '22"},"container-title":["Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563542","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3548606.3563542","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:06Z","timestamp":1750182666000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3548606.3563542"}},"subtitle":["A Post-Quantum Oblivious PRF from Isogenies"],"short-title":[],"issued":{"date-parts":[[2022,11,7]]},"references-count":10,"alternative-id":["10.1145\/3548606.3563542","10.1145\/3548606"],"URL":"https:\/\/doi.org\/10.1145\/3548606.3563542","relation":{},"subject":[],"published":{"date-parts":[[2022,11,7]]},"assertion":[{"value":"2022-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}