Results 21 to 30 of about 274 (176)
On the Performance Analysis for CSIDH-Based Cryptosystems
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange ...
Donghoe Heo +3 more
doaj +1 more source
An efficient post-quantum KEM from CSIDH
The SIDH and CSIDH are now the two most well-known post-quantum key exchange protocols from the supersingular isogeny-based cryptography, which have attracted much attention in recent years and served as the building blocks of other supersingular isogeny-
Qi Mingping
doaj +1 more source
Constructing Cycles in Isogeny Graphs of Supersingular Elliptic Curves
Loops and cycles play an important role in computing endomorphism rings of supersingular elliptic curves and related cryptosystems. For a supersingular elliptic curve E defined over đť”˝p2, if an imaginary quadratic order O can be embedded in End(E) and a ...
Xiao Guanju, Luo Lixia, Deng Yingpu
doaj +1 more source
Complete Analysis of Implementing Isogeny-Based Cryptography Using Huff Form of Elliptic Curves
In this paper, we present the analysis of Huff curves for implementing isogeny-based cryptography. In this regard, we first investigate the computational cost of the building blocks when compression functions are used for Huff curves.
Suhri Kim
doaj +1 more source
Strategies and their evaluations play important roles in speeding up the computation of large smooth-degree isogenies. The concept of optimal strategies for such computation was introduced by De Feo et al., and virtually all implementations of isogeny ...
Kittiphon Phalakarn +3 more
doaj +1 more source
Genus Two Isogeny Cryptography [PDF]
We study \((\ell ,\ell )\)-isogeny graphs of principally polarised supersingular abelian surfaces (PPSSAS). The \((\ell ,\ell )\)-isogeny graph has cycles of small length that can be used to break the collision resistance assumption of the genus two isogeny hash function suggested by Takashima.
Flynn, E, Ti, Y
openaire +1 more source
Hash functions from superspecial genus-2 curves using Richelot isogenies
In 2018 Takashima proposed a version of Charles, Goren and Lauter’s hash function using Richelot isogenies, starting from a genus-2 curve that allows for all subsequent arithmetic to be performed over a quadratic finite field 𝔽p2.
Castryck Wouter +2 more
doaj +1 more source
Isogeny in superstable groups [PDF]
We study and develop a notion of isogeny for superstable groups. We prove several fundamental properties of the notion and then use it to formulate and prove uniqueness results. Connections to existing model theoretic notions are explained.
openaire +3 more sources
The effective Shafarevich conjecture for abelian varieties of ${\text {GL}_{2}}$-type
In this article we establish the effective Shafarevich conjecture for abelian varieties over ${\mathbb Q}$ of ${\text {GL}_2}$-type. The proof combines Faltings’ method with Serre’s modularity conjecture, isogeny estimates and results from Arakelov ...
Rafael von Känel
doaj +1 more source
Rational Isogenies from Irrational Endomorphisms
In this paper, we introduce a polynomial-time algorithm to compute a connecting \(\mathcal {O}\)-ideal between two supersingular elliptic curves over \(\mathbb {F}_p\) with common \(\mathbb {F}_p\)-endomorphism ring \(\mathcal {O}\), given a description of their full endomorphism rings.
Castryck, Wouter +2 more
openaire +2 more sources

