Results 201 to 210 of about 8,681 (237)
Some of the next articles are maybe not open access.
Explicit isogenies of prime degree over number fields
Algebra & Number Theory, 2022We provide an explicit and algorithmic version of a theorem of Momose classifying isogenies of prime degree of elliptic curves over number fields, which we implement in Sage and PARI/GP.
Barinder S. Banwait, M. Derickx
semanticscholar +1 more source
OPRFs from Isogenies: Designs and Analysis
IACR Cryptology ePrint ArchiveOblivious Pseudorandom Functions (OPRFs) are an elementary building block in cryptographic and privacy-preserving applications. While there are numerous pre-quantum secure OPRF constructions, it is unclear which of the proposed options for post-quantum ...
Lena Heimberger +4 more
semanticscholar +1 more source
CAPYBARA and TSUBAKI: Verifiable Random Functions from Group Actions and Isogenies
IACR Cryptology ePrint ArchiveIn this work, we introduce two post-quantum Verifiable Random Function (VRF) constructions based on abelian group actions and isogeny group actions with a twist. The former relies on the standard group action Decisional Diffie-Hellman (GA-DDH) assumption.
Yi-Fu Lai
semanticscholar +1 more source
Fast computation of 2-isogenies in dimension 4 and cryptographic applications
IACR Cryptology ePrint ArchiveDimension 4 isogenies have first been introduced in cryptography for the cryptanalysis of Supersingular Isogeny Diffie-Hellman (SIDH) and have been used constructively in several schemes, including SQIsignHD, a derivative of SQIsign isogeny based ...
Pierrick Dartois
semanticscholar +1 more source
Efficient (3, 3)-isogenies on fast Kummer surfaces
IACR Cryptology ePrint ArchiveWe give an alternative derivation of $(N,N)$-isogenies between fast Kummer surfaces which complements existing works based on the theory oftheta functions.
Maria Corte-Real Santos +2 more
semanticscholar +1 more source
KLaPoTi: An asymptotically efficient isogeny group action from 2-dimensional isogenies
IACR Cryptology ePrint ArchiveWe construct and implement an efficient post-quantum commutative cryptographic group action based on combining the SCALLOP framework for group actions from isogenies of oriented elliptic curves on one hand with the recent Clapoti method for polynomial ...
Lorenz Panny +2 more
semanticscholar +1 more source
A Post-Quantum Round-Optimal Oblivious PRF from Isogenies
IACR Cryptology ePrint Archive, 2023Andrea Basso
semanticscholar +1 more source
SCALLOP-HD: group action from 2-dimensional isogenies
IACR Cryptology ePrint Archive, 2023Mingjie Chen, Antonin Leroux
semanticscholar +1 more source
Verifiable random function from the Deuring correspondence and higher dimensional isogenies
IACR Cryptology ePrint Archive, 2023Antonin Leroux
semanticscholar +1 more source

