Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the CSIDH algorithm, a post-quantum cryptographic scheme based on isogenies. It discusses the history of shared secret computation, the impact of quantum computing, the inner workings of CSIDH, and its security and performance. The lecture explains how CSIDH works, its theoretical background, and its comparison with other cryptographic schemes.