Results 1 to 10 of about 3,965 (252)

Isogenies on twisted Hessian curves [PDF]

open access: goldJournal of Mathematical Cryptology, 2021
Elliptic curves are typically defined by Weierstrass equations. Given a kernel, the well-known Vélu's formula shows how to explicitly write down an isogeny between Weierstrass curves. However, it is not clear how to do the same on other forms of elliptic
Perez Broon Fouazou Lontouo   +3 more
doaj   +7 more sources

Orienting supersingular isogeny graphs [PDF]

open access: goldJournal of Mathematical Cryptology, 2020
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs.
ColĂČ Leonardo, Kohel David
exaly   +5 more sources

How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]

open access: goldInternational Journal of Electronics and Telecommunications, 2022
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Ɓukasz Dzierzkowski, MichaƂ WroƄski
doaj   +3 more sources

CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist. [PDF]

open access: yesDes Codes Cryptogr
In this paper, we construct the first provably-secure isogeny-based (partially) blind signature scheme. While at a high level the scheme resembles the Schnorr blind signature, our work does not directly follow from that construction, since isogenies do ...
Katsumata S, Lai YF, LeGrow JT, Qin L.
europepmc   +2 more sources

Fast and Frobenius: Rational Isogeny Evaluation over Finite Fields [PDF]

open access: greenIACR Cryptology ePrint Archive, 2023
Consider the problem of efficiently evaluating isogenies $\phi: E \to E/H$ of elliptic curves over a finite field $\mathbb{F}_q$, where the kernel $H = \langle G\rangle$ is a cyclic group of odd (prime) order: given $E$, $G$, and a point (or several ...
Gustavo Banegas   +3 more
openalex   +3 more sources

A classification of isogeny‐torsion graphs of Q‐isogeny classes of elliptic curves

open access: yesTransactions of the London Mathematical Society, 2021
Let E be a Q‐isogeny class of elliptic curves defined over Q. The isogeny graph associated to E is a graph which has a vertex for each elliptic curve in the Q‐isogeny class E, and an edge for each cyclic Q‐isogeny of prime degree between elliptic curves ...
Álvaro Lozano-Robledo
exaly   +2 more sources

The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents

open access: yesJournal of Cryptographic Engineering, 2021
Recent independent analyses by Bonnetain–Schrottenloher and Peikert in Eurocrypt 2020 significantly reduced the estimated quantum security of the isogeny-based commutative group action key-exchange protocol CSIDH.
Samuel Jaques   +1 more
exaly   +2 more sources

SIKE’d Up: Fast Hardware Architectures for Supersingular Isogeny Key Encapsulation

open access: yesIEEE Transactions on Circuits and Systems I: Regular Papers, 2020
In this work, we present a fast parallel architecture to perform supersingular isogeny key encapsulation (SIKE). We propose and implement a fast isogeny accelerator architecture that uses fast and parallelized isogeny formulas.
Brian Koziel   +2 more
exaly   +2 more sources

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange

open access: greenTransactions on Cryptographic Hardware and Embedded Systems, 2018
We present high-speed implementations of the post-quantum supersingular isogeny Diffie-Hellman key exchange (SIDH) and the supersingular isogeny key encapsulation (SIKE) protocols for 32-bit ARMv7-A processors with NEON support.
Hwajeong Seo   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy