Results 11 to 20 of about 6,385 (201)

Constructing Permutation Rational Functions From Isogenies [PDF]

open access: yesSIAM Journal on Discrete Mathematics, 2017
A permutation rational function $f\in \mathbb{F}_q(x)$ is a rational function that induces a bijection on $\mathbb{F}_q$, that is, for all $y\in\mathbb{F}_q$ there exists exactly one $x\in\mathbb{F}_q$ such that $f(x)=y$.
Bisson, Gaetan, Tibouchi, Mehdi
core   +3 more sources

Isogeny and overconvergence

open access: yesComptes Rendus. Mathématique
In this paper, we apply Tsuzuki’s main theorem in [12] to establish a criterion for when two abelian varieties over a function field $K$ of characteristic $p$ are isogenous. Specifically, assuming that their endomorphism algebras tensored with $\mathbb{Q}
Chiarellotto, Bruno, Trihan, Fabien
doaj   +2 more sources

Radical Isogenies [PDF]

open access: yes, 2020
sponsorship: This work was supported in part by the Research Council KU Leuven grants C14/18/067 and STG/17/019, by CyberSecurity Research Flanders with reference number VR20192203, and by the Research Foundation Flanders (FWO) through the WOG Coding Theory and Cryptography. (Research Council KU Leuven|C14/18/067, Research Council KU Leuven|STG/17/019,
Castryck, Wouter   +2 more
openaire   +2 more sources

Derived isogenies and isogenies for abelian surfaces

open access: yes, 2021
In this paper, we study the twisted Fourier-Mukai partners of abelian surfaces. Following the work of Huybrechts [doi:10.4171/CMH/465], we introduce the twisted derived equivalence between abelian surfaces. We show that there is a twisted derived Torelli theorem for abelian surfaces over algebraically closed fields with characteristic $\neq 2,3$.
Li, Zhiyuan, Zou, Haitao
openaire   +2 more sources

Algebraic approaches for solving isogeny problems of prime power degrees

open access: yesJournal of Mathematical Cryptology, 2020
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi   +5 more
doaj   +1 more source

On the supersingular GPST attack

open access: yesJournal of Mathematical Cryptology, 2021
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj   +1 more source

Computing low-degree isogenies in genus 2 with the Dolgachev-Lehavi method [PDF]

open access: yes, 2012
Let ell be a prime, and H a curve of genus 2 over a field k of characteristic not 2 or ell. If S is a maximal Weil-isotropic subgroup of Jac(H)[ell], then Jac(H)/S is isomorphic to the Jacobian of some (possibly reducible) curve X.
Smith, Benjamin
core   +5 more sources

Modular isogeny complexes [PDF]

open access: yesAlgebraic & Geometric Topology, 2012
Minor revisions for ...
openaire   +3 more sources

Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring [PDF]

open access: yes, 2012
Using Galois cohomology, Schmoyer characterizes cryptographic non-trivial self-pairings of the $\ell$-Tate pairing in terms of the action of the Frobenius on the $\ell$-torsion of the Jacobian of a genus 2 curve.
Belding   +15 more
core   +10 more sources

Multiparty Non-Interactive Key Exchange and More From Isogenies on Elliptic Curves

open access: yesJournal of Mathematical Cryptology, 2020
We describe a framework for constructing an efficient non-interactive key exchange (NIKE) protocol for n parties for any n ≥ 2. Our approach is based on the problem of computing isogenies between isogenous elliptic curves, which is believed to be ...
Boneh Dan   +7 more
doaj   +1 more source

Home - About - Disclaimer - Privacy