Results 21 to 30 of about 5,346 (174)

Isogeny graphs with maximal real multiplication [PDF]

open access: yes, 2019
An isogeny graph is a graph whose vertices are principally polarized abelian varieties and whose edges are isogenies between these varieties. In his thesis, Kohel described the structure of isogeny graphs for elliptic curves and showed that one may ...
Ionica, Sorina, Thomé, Emmanuel
core   +5 more sources

Ramanujan graphs in cryptography [PDF]

open access: yes, 2018
In this paper we study the security of a proposal for Post-Quantum Cryptography from both a number theoretic and cryptographic perspective. Charles-Goren-Lauter in 2006 [CGL06] proposed two hash functions based on the hardness of finding paths in ...
Costache, Anamaria   +4 more
core   +2 more sources

Optimized CSIDH Implementation Using a 2-Torsion Point

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +1 more source

Isogeny-based post-quantum key exchange protocols [PDF]

open access: yes, 2020
The goal of this project is to understand and analyze the supersingular isogeny Diffie Hellman (SIDH), a post-quantum key exchange protocol which security lies on the isogeny-finding problem between supersingular elliptic curves.
Sorinas Capdevila, Ernest
core  

Pairing-based algorithms for jacobians of genus 2 curves with maximal endomorphism ring [PDF]

open access: yes, 2012
Using Galois cohomology, Schmoyer characterizes cryptographic non-trivial self-pairings of the $\ell$-Tate pairing in terms of the action of the Frobenius on the $\ell$-torsion of the Jacobian of a genus 2 curve.
Belding   +15 more
core   +10 more sources

Towards Isogeny-Based Password-Authenticated Key Establishment

open access: yesJournal of Mathematical Cryptology, 2020
Password authenticated key establishment (PAKE) is a cryptographic primitive that allows two parties who share a low-entropy secret (a password) to securely establish cryptographic keys in the absence of public key infrastructure.
Taraskin Oleg   +3 more
doaj   +1 more source

Vectorized and Parallel Computation of Large Smooth-Degree Isogenies using Precedence-Constrained Scheduling

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2023
Strategies and their evaluations play important roles in speeding up the computation of large smooth-degree isogenies. The concept of optimal strategies for such computation was introduced by De Feo et al., and virtually all implementations of isogeny ...
Kittiphon Phalakarn   +3 more
doaj   +1 more source

Explicit isogenies in quadratic time in any characteristic [PDF]

open access: yes, 2016
Consider two elliptic curves $E,E'$ defined over the finite field $\mathbb{F}_q$, and suppose that there exists an isogeny $\psi$ between $E$ and $E'$.
De Feo, Luca   +3 more
core   +1 more source

On certain isogenies between K3 surfaces [PDF]

open access: yes, 2019
The aim of this paper is to construct "special" isogenies between K3 surfaces, which are not Galois covers between K3 surfaces, but are obtained by composing cyclic Galois covers, induced by quotients by symplectic automorphisms.
Camere, Chiara, Garbagnati, Alice
core   +3 more sources

Genus Two Isogeny Cryptography [PDF]

open access: yes, 2019
We study \((\ell ,\ell )\)-isogeny graphs of principally polarised supersingular abelian surfaces (PPSSAS). The \((\ell ,\ell )\)-isogeny graph has cycles of small length that can be used to break the collision resistance assumption of the genus two isogeny hash function suggested by Takashima.
Flynn, E, Ti, Y
openaire   +1 more source

Home - About - Disclaimer - Privacy