Results 71 to 80 of about 1,022 (119)

Orienteering with One Endomorphism. [PDF]

open access: yesMathematica (N Y), 2023
Arpin S   +5 more
europepmc   +1 more source

Efficient supersingularity testing over F_p and CSIDH key validation

open access: yes, 2022
Many public-key cryptographic protocols, notably non-interactive key exchange (NIKE), require incoming public keys to be validated to mitigate some adaptive attacks. In CSIDH, an isogeny-based post-quantum NIKE, a key is deemed legitimate if the given Montgomery coefficient specifies a supersingular elliptic curve over the prime field. In this work, we
Banegas, Gustavo   +2 more
openaire   +1 more source

The supersingular endomorphism ring problem given one endomorphism

open access: yes, 2023
Given a supersingular elliptic curve E and a non-scalar endomorphism $\alpha$ of E, we prove that the endomorphism ring of E can be computed in classical time about disc(Z[$\alpha$])^1/4 , and in quantum subexponential time, assuming the generalised ...
Merdy, Arthur Herlédan Le   +1 more
core  

Supersingular Endomorphism Rings: Algorithms and Applications [PDF]

open access: yes
This thesis is about the endomorphism rings of supersingular elliptic curves, their applications in cryptography, and related algorithms. These algorithms and applications all involve an interplay between supersingular elliptic curves and quaternion ...
Eriksen, Jonathan Komada
core  

Optimized Method for Computing Odd-Degree Isogenies on Edwards Curves [PDF]

open access: yes, 2019
In this paper, we present an efficient method to compute arbitrary odd-degree isogenies on Edwards curves. By using the $w$-coordinate, we optimized the isogeny formula on Edwards curves by Moody and Shumow.
Kisoon Yoon   +3 more
core  

Isogeny Graphs and Cryptographic Applications [PDF]

open access: yes
In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks.

core  

Cryptography on Isogeny Graphs [PDF]

open access: yes, 2021
Panny, Lorenz
core  

Deterministic algorithms for class group actions [PDF]

open access: yes
We present an algorithm for the CSIDH protocol that is fully deterministic and strictly constant time. It does not require dummy operations and can be implemented without conditional branches.
Marc Houben
core  

Home - About - Disclaimer - Privacy