Results 31 to 40 of about 274 (176)
Let us walk on the 3-isogeny graph: efficient, fast, and simple
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez +2 more
doaj +1 more source
Ordinary primes for GL2$\operatorname{GL}_2$‐type abelian varieties and weight 2 modular forms
Abstract Let A$A$ be a g$g$‐dimensional abelian variety defined over a number field F$F$. It is conjectured that the set of ordinary primes of A$A$ over F$F$ has positive density, and this is known to be true when g=1,2$g=1, 2$, or for certain abelian varieties with extra endomorphisms.
Tian Wang, Pengcheng Zhang
wiley +1 more source
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure.
Luca De Feo +6 more
doaj +1 more source
Horizontal Racewalking Using Radical Isogenies
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT -No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203.
Castryck, Wouter +3 more
openaire +2 more sources
Vector bundles on bielliptic surfaces: Ulrich bundles and degree of irrationality
Abstract This paper deals with two problems about vector bundles on bielliptic surfaces. The first is to give a classification of Ulrich bundles on such surfaces S$S$, which depends on the topological type of S$S$. In doing so, we study the weak Brill–Noether property for moduli spaces of sheaves with isotropic Mukai vector. Adapting an idea of Moretti
Edoardo Mason
wiley +1 more source
Optimization of isogeny computation algorithms for post-quantum cryptography
Isogeny-based cryptography has emerged as a strong candidate for post-quantum security due to the believed hardness of finding isogenies between supersingular elliptic curves.
Mohammed El Baraka, Siham Ezzouak
doaj +1 more source
We prove by means of the study of the infinitesimal variation of Hodge structure and a generalization of the classical Babbage-Enriques-Petri theorem that the Jacobian variety of a generic element of a $k$ codimensional subvariety of $\mathcal M_g$ is not isogenous to a distinct Jacobian if $g>3k+4$.
Marcucci, Valeria +2 more
openaire +7 more sources
On the Euler characteristic of S$S$‐arithmetic groups
Abstract We show that the sign of the Euler characteristic of an S$S$‐arithmetic subgroup of a simple algebraic group depends on the S$S$‐congruence completion only, except possibly in type 6D4${}^6 D_4$. Consequently, the sign is a profinite invariant for such S$S$‐arithmetic groups with the congruence subgroup property. This generalizes previous work
Holger Kammeyer, Giada Serafini
wiley +1 more source
Highly Vectorized SIKE for AVX-512
It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure.
Hao Cheng +3 more
doaj +1 more source
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez +2 more
doaj +1 more source

