Results 21 to 30 of about 3,965 (252)

Isogeny and overconvergence

open access: yesComptes Rendus. Mathématique
In this paper, we apply Tsuzuki’s main theorem in [12] to establish a criterion for when two abelian varieties over a function field $K$ of characteristic $p$ are isogenous. Specifically, assuming that their endomorphism algebras tensored with $\mathbb{Q}
Chiarellotto, Bruno, Trihan, Fabien
doaj   +2 more sources

Review of Chosen Isogeny-Based Cryptographic Schemes

open access: yesCryptography, 2022
Public-key cryptography provides security for digital systems and communication. Traditional cryptographic solutions are constantly improved, e.g., to suppress brute-force attacks.
Bartosz Drzazga, Łukasz Krzywiecki
doaj   +1 more source

Failing to hash into supersingular isogeny graphs [PDF]

open access: yesIACR Cryptology ePrint Archive, 2022
An important open problem in supersingular isogeny-based cryptography is to produce, without a trusted authority, concrete examples of ‘hard supersingular curves’ that is equations for supersingular curves for which computing the endomorphism ring is ...
J. Booher   +14 more
semanticscholar   +1 more source

Derived isogenies and isogenies for abelian surfaces

open access: yes, 2021
In this paper, we study the twisted Fourier-Mukai partners of abelian surfaces. Following the work of Huybrechts [doi:10.4171/CMH/465], we introduce the twisted derived equivalence between abelian surfaces. We show that there is a twisted derived Torelli theorem for abelian surfaces over algebraically closed fields with characteristic $\neq 2,3$.
Li, Zhiyuan, Zou, Haitao
openaire   +2 more sources

Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols

open access: yesIACR Cryptology ePrint Archive, 2023
We propose a novel approach that generalizes interleaved modular multiplication algorithms for the computation of sums of products over large prime fields. This operation has widespread use and is at the core of many cryptographic applications.
P. Longa
semanticscholar   +1 more source

Algebraic approaches for solving isogeny problems of prime power degrees

open access: yesJournal of Mathematical Cryptology, 2020
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi   +5 more
doaj   +1 more source

Towards High-Performance Supersingular Isogeny Cryptographic Hardware Accelerator Design

open access: yesElectronics, 2023
Cryptosystems based on supersingular isogeny are a novel tool in post-quantum cryptography. One compelling characteristic is their concise keys and ciphertexts. However, the performance of supersingular isogeny computation is currently worse than that of
Guantong Su, Guoqiang Bai
semanticscholar   +1 more source

On the Kolyvagin's formula, the Tate pairing associated to an isogeny, the local Artin map and the Hilberts symbol

open access: yesKarpatsʹkì Matematičnì Publìkacìï, 2013
A proof of nondegeneracy of the Tate pairing and Kolyvagin's formula for elliptic curves with good reductions over an $n$-dimensional $(n\leq 3)$ pseudolocal field, the Tate pairing associated to an isogeny between abelian varieties over pseudolocal ...
V.I. Nesteruk
doaj   +3 more sources

Modular isogeny complexes [PDF]

open access: yesAlgebraic & Geometric Topology, 2012
Minor revisions for ...
openaire   +3 more sources

Optimized CSIDH Implementation Using a 2-Torsion Point

open access: yesCryptography, 2020
The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when ...
Donghoe Heo   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy