Multiple Instances of SIDH. In this section we will apply the previous theory to the SIDH key agreement protocol to enable secure use of static keys. We then estimate the expected amount of work required to break our transformation in this case.
Appears in 2 contracts
Sources: Key Agreement Protocol, Key Agreement Protocol