Results 31 to 40 of about 274 (176)

Let us walk on the 3-isogeny graph: efficient, fast, and simple

open access: yesTransactions on Cryptographic Hardware and Embedded Systems
Constructing and implementing isogeny-based cryptographic primitives is an active research. In particular, performing length-n isogenies walks over quadratic field extensions of Fp plays an exciting role in some constructions, including Hash functions ...
Jesús-Javier Chi-Domínguez   +2 more
doaj   +1 more source

Ordinary primes for GL2$\operatorname{GL}_2$‐type abelian varieties and weight 2 modular forms

open access: yesMathematika, Volume 72, Issue 2, April 2026.
Abstract Let A$A$ be a g$g$‐dimensional abelian variety defined over a number field F$F$. It is conjectured that the set of ordinary primes of A$A$ over F$F$ has positive density, and this is known to be true when g=1,2$g=1, 2$, or for certain abelian varieties with extra endomorphisms.
Tian Wang, Pengcheng Zhang
wiley   +1 more source

SIKE Channels

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
We present new side-channel attacks on SIKE, the isogeny-based candidate in the NIST PQC competition. Previous works had shown that SIKE is vulnerable to differential power analysis, and pointed to coordinate randomization as an effective countermeasure.
Luca De Feo   +6 more
doaj   +1 more source

Horizontal Racewalking Using Radical Isogenies

open access: yes, 2022
sponsorship: This work was supported in part by the European Research Council (ERC) under the European Union's Horizon 2020 research and innovation programme (grant agreement ISOCRYPT -No. 101020788) and by CyberSecurity Research Flanders with reference number VR20192203.
Castryck, Wouter   +3 more
openaire   +2 more sources

Vector bundles on bielliptic surfaces: Ulrich bundles and degree of irrationality

open access: yesMathematische Nachrichten, Volume 299, Issue 3, Page 514-528, March 2026.
Abstract This paper deals with two problems about vector bundles on bielliptic surfaces. The first is to give a classification of Ulrich bundles on such surfaces S$S$, which depends on the topological type of S$S$. In doing so, we study the weak Brill–Noether property for moduli spaces of sheaves with isotropic Mukai vector. Adapting an idea of Moretti
Edoardo Mason
wiley   +1 more source

Optimization of isogeny computation algorithms for post-quantum cryptography

open access: yesScientific African
Isogeny-based cryptography has emerged as a strong candidate for post-quantum security due to the believed hardness of finding isogenies between supersingular elliptic curves.
Mohammed El Baraka, Siham Ezzouak
doaj   +1 more source

Isogenies of Jacobians

open access: yesAlgebraic Geometry, 2016
We prove by means of the study of the infinitesimal variation of Hodge structure and a generalization of the classical Babbage-Enriques-Petri theorem that the Jacobian variety of a generic element of a $k$ codimensional subvariety of $\mathcal M_g$ is not isogenous to a distinct Jacobian if $g>3k+4$.
Marcucci, Valeria   +2 more
openaire   +7 more sources

On the Euler characteristic of S$S$‐arithmetic groups

open access: yesJournal of the London Mathematical Society, Volume 113, Issue 3, March 2026.
Abstract We show that the sign of the Euler characteristic of an S$S$‐arithmetic subgroup of a simple algebraic group depends on the S$S$‐congruence completion only, except possibly in type 6D4${}^6 D_4$. Consequently, the sign is a profinite invariant for such S$S$‐arithmetic groups with the congruence subgroup property. This generalizes previous work
Holger Kammeyer, Giada Serafini
wiley   +1 more source

Highly Vectorized SIKE for AVX-512

open access: yesTransactions on Cryptographic Hardware and Embedded Systems, 2022
It is generally accepted that a large-scale quantum computer would be capable to break any public-key cryptosystem used today, thereby posing a serious threat to the security of the Internet’s public-key infrastructure.
Hao Cheng   +3 more
doaj   +1 more source

Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH

open access: yesIET Information Security, 2021
The supersingular isogeny Diffie–Hellman key exchange protocol (SIDH) was introduced by Jao and De Feo in 2011. SIDH operates on supersingular elliptic curves defined over Fp2, where p is a large prime number of the form p=4eA3eB−1 and eA and eB are ...
Daniel Cervantes‐Vázquez   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy