Results 21 to 30 of about 10,757 (241)
How to Compute an Isogeny on the Extended Jacobi Quartic Curves? [PDF]
Computing isogenies between elliptic curves is a significant part of post-quantum cryptography with many practical applications (for example, in SIDH, SIKE, B-SIDH, or CSIDH algorithms).
Łukasz Dzierzkowski, Michał Wroński
doaj +1 more source
Optimal Strategies for Computation of Degree ℓn Isogenies for SIDH [PDF]
This article presents methods and algorithms for the computation of isogenies of degree ℓn. Some of these methods are obtained using recurrence equations and generating functions.
Michał Wroński, Andrzej Chojnacki
doaj +1 more source
sponsorship: This work was supported in part by the Research Council KU Leuven grants C14/18/067 and STG/17/019, by CyberSecurity Research Flanders with reference number VR20192203, and by the Research Foundation Flanders (FWO) through the WOG Coding Theory and Cryptography. (Research Council KU Leuven|C14/18/067, Research Council KU Leuven|STG/17/019,
Castryck, Wouter +2 more
openaire +2 more sources
Practical Usage of Radical Isogenies for CSIDH
Recently, a radical isogeny was proposed to boost commutative supersingular isogeny Diffie–Hellman (CSIDH) implementation. Radical isogenies reduce the generation of a kernel of a small prime order when implementing CSIDH.
Donghoe Heo, Suhri Kim, Seokhie Hong
doaj +1 more source
Torsion point attacks on ‘SIDH‐like’ cryptosystems
Isogeny‐based cryptography is a promising approach for post‐quantum cryptography. The best‐known protocol following that approach is the supersingular isogeny Diffie–Hellman protocol (SIDH); this protocol was turned into the CCA‐secure key encapsulation ...
Péter Kutas, Christophe Petit
doaj +1 more source
In this paper, we apply Tsuzuki’s main theorem in [12] to establish a criterion for when two abelian varieties over a function field $K$ of characteristic $p$ are isogenous. Specifically, assuming that their endomorphism algebras tensored with $\mathbb{Q}
Chiarellotto, Bruno, Trihan, Fabien
doaj +2 more sources
Derived isogenies and isogenies for abelian surfaces
In this paper, we study the twisted Fourier-Mukai partners of abelian surfaces. Following the work of Huybrechts [doi:10.4171/CMH/465], we introduce the twisted derived equivalence between abelian surfaces. We show that there is a twisted derived Torelli theorem for abelian surfaces over algebraically closed fields with characteristic $\neq 2,3$.
Li, Zhiyuan, Zou, Haitao
openaire +2 more sources
Algebraic approaches for solving isogeny problems of prime power degrees
Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach
Takahashi Yasushi +5 more
doaj +1 more source
Isogeny graphs with maximal real multiplication [PDF]
An isogeny graph is a graph whose vertices are principally polarized abelian varieties and whose edges are isogenies between these varieties. In his thesis, Kohel described the structure of isogeny graphs for elliptic curves and showed that one may ...
Ionica, Sorina, Thomé, Emmanuel
core +5 more sources
Deligne's Conjecture on 1-Motives [PDF]
We reformulate a conjecture of Deligne on 1-motives by using the integral weight filtration of Gillet and Soul\'e on cohomology, and prove it. This implies the original conjecture up to isogeny.
Barbieri-Viale, Luca +2 more
core +2 more sources

