Results 11 to 20 of about 5,346 (174)
The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper
Sutherland, Andrew V.
core +2 more sources
In this paper, we apply Tsuzuki’s main theorem in [12] to establish a criterion for when two abelian varieties over a function field $K$ of characteristic $p$ are isogenous. Specifically, assuming that their endomorphism algebras tensored with $\mathbb{Q}
Chiarellotto, Bruno, Trihan, Fabien
doaj +2 more sources
Derived isogenies and isogenies for abelian surfaces
In this paper, we study the twisted Fourier-Mukai partners of abelian surfaces. Following the work of Huybrechts [doi:10.4171/CMH/465], we introduce the twisted derived equivalence between abelian surfaces. We show that there is a twisted derived Torelli theorem for abelian surfaces over algebraically closed fields with characteristic $\neq 2,3$.
Li, Zhiyuan, Zou, Haitao
openaire +2 more sources
Isogeny graphs of ordinary abelian varieties [PDF]
Fix a prime number $\ell$. Graphs of isogenies of degree a power of $\ell$ are well-understood for elliptic curves, but not for higher-dimensional abelian varieties.
Brooks, Ernest Hunter +2 more
core +2 more sources
A trade-off between classical and quantum circuit size for an attack against CSIDH
We propose a heuristic algorithm to solve the underlying hard problem of the CSIDH cryptosystem (and other isogeny-based cryptosystems using elliptic curves with endomorphism ring isomorphic to an imaginary quadratic order 𝒪).
Biasse Jean-François +4 more
doaj +1 more source
Algebraic approaches for solving isogeny problems of prime power degrees
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi +5 more
doaj +1 more source
On the supersingular GPST attack
The main attack against static-key supersingular isogeny Diffie–Hellman (SIDH) is the Galbraith–Petit–Shani–Ti (GPST) attack, which also prevents the application of SIDH to other constructions such as non-interactive key-exchange.
Basso Andrea, Pazuki Fabien
doaj +1 more source
Optimal Strategies for Computation of Degree ℓn Isogenies for SIDH [PDF]
This article presents methods and algorithms for the computation of isogenies of degree ℓn. Some of these methods are obtained using recurrence equations and generating functions.
Michał Wroński, Andrzej Chojnacki
doaj +1 more source
Modular isogeny complexes [PDF]
Minor revisions for ...
openaire +3 more sources
Families of explicitly isogenous Jacobians of variable-separated curves [PDF]
We construct six infinite series of families of pairs of curves (X,Y) of arbitrarily high genus, defined over number fields, together with an explicit isogeny from the Jacobian of X to the Jacobian of Y splitting multiplication by 2, 3, or 4.
Arbarello +17 more
core +6 more sources

