Results 1 to 10 of about 5,346 (174)

Isogenies on twisted Hessian curves [PDF]

open access: yesJournal of Mathematical Cryptology, 2021
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo   +3 more
doaj   +6 more sources

Cuts and isogenies [PDF]

open access: yesJournal of High Energy Physics, 2021
We consider the genus-one curves which arise in the cuts of the sunrise and in the elliptic double-box Feynman integrals. We compute and compare invariants of these curves in a number of ways, including Feynman parametrization, lightcone and Baikov (in ...
Hjalte Frellesvig   +3 more
doaj   +6 more sources

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

open access: yesJournal of Mathematical Cryptology, 2020
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Dan Boneh   +2 more
exaly   +2 more sources

An Efficient Signature Scheme From Supersingular Elliptic Curve Isogenies

open access: yesIEEE Access, 2019
Since supersingular elliptic curve isogenies are one of the several candidate sources of hardness for building post-quantum cryptographic primitives, the research of efficient signature schemes based on them is still a hot topic.
Fangguo Zhang, Huang Zhang
exaly   +3 more sources

Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies

open access: yesJournal of Mathematical Cryptology, 2014
We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases
Luca De Feo, David Jao
exaly   +2 more sources

Constructing elliptic curve isogenies in quantum subexponential time

open access: yesJournal of Mathematical Cryptology, 2014
Given two ordinary elliptic curves over a finite field having the same cardinality and endomorphism ring, it is known that the curves admit a nonzero isogeny between them, but finding such an isogeny is believed to be computationally difficult.
Andrew M Childs
exaly   +2 more sources

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: yesInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj   +1 more source

Practical Usage of Radical Isogenies for CSIDH

open access: yesIEEE Access, 2023
Recently, a radical isogeny was proposed to boost commutative supersingular isogeny Diffie–Hellman (CSIDH) implementation. Radical isogenies reduce the generation of a kernel of a small prime order when implementing CSIDH.
Donghoe Heo, Suhri Kim, Seokhie Hong
doaj   +1 more source

Verifiable delay functions and delay encryptions from hyperelliptic curves

open access: yesCybersecurity, 2023
Verifiable delay functions (VDFs) and delay encryptions (DEs) are two important primitives in decentralized systems, while existing constructions are mainly based on time-lock puzzles.
Chao Chen, Fangguo Zhang
doaj   +1 more source

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Home - About - Disclaimer - Privacy