Towards practical key exchange from ordinary isogeny graphs (Q1710681): Difference between revisions

From MaRDI portal
m rollbackEdits.php mass rollback
Tag: Rollback
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / OpenAlex ID
 
Property / OpenAlex ID: W4289542210 / rank
 
Normal rank
Property / arXiv ID
 
Property / arXiv ID: 1809.07543 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2724434 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic Curves and Primality Proving / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536798 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast algorithms for computing isogenies between elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modular polynomials via isogeny volcanoes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Class polynomials for nonholomorphic modular functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A key-exchange system based on imaginary quadratic fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778861 / rank
 
Normal rank
Property / cites work
 
Property / cites work: CSIDH: an efficient post-quantum commutative group action / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing elliptic curve isogenies in quantum subexponential time / rank
 
Normal rank
Property / cites work
 
Property / cites work: Elliptic curve cryptosystems in the presence of permanent and transient faults / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3139838 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3222942 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A simple and compact algorithm for SIDH with arbitrary degree isogenies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Explicit isogenies in quadratic time in any characteristic / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5670687 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nemo/Hecke / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737492 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure integration of asymmetric and symmetric encryption schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Improved algorithm for the isogeny problem for ordinary elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing Isogenies between Elliptic Curves Over Finite Fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mathematics of Public Key Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4737234 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Security of Supersingular Isogeny Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A modular analysis of the Fujisaki-Okamoto transformation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pairing the volcano / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expander graphs based on GRH with an application to elliptic curve cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Subexponential Algorithm for Evaluating Large Degree Isogenies / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4536800 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4723876 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364556 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public key cryptography based on semigroup actions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3758034 / rank
 
Normal rank
Property / cites work
 
Property / cites work: An algorithm to compute volcanoes of 2-isogenies of elliptic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: Speeding the Pollard and Elliptic Curve Methods of Factorization / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing the number of points on an elliptic curve over a finite field: algorithmic aspects / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4950049 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Computing isogenies between Montgomery curves using the action of \((0,0)\) / rank
 
Normal rank
Property / cites work
 
Property / cites work: Counting points on elliptic curves over finite fields / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Arithmetic of Elliptic Curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4317891 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves / rank
 
Normal rank
Property / cites work
 
Property / cites work: Accelerating the CM method / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constructing elliptic curves over finite fields with prescribed torsion / rank
 
Normal rank
Property / cites work
 
Property / cites work: An elliptic curve trapdoor system / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q5631239 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Algorithmic Number Theory / rank
 
Normal rank

Latest revision as of 22:53, 17 July 2024

scientific article
Language Label Description Also known as
English
Towards practical key exchange from ordinary isogeny graphs
scientific article

    Statements

    Towards practical key exchange from ordinary isogeny graphs (English)
    0 references
    0 references
    23 January 2019
    0 references
    post-quantum cryptography
    0 references
    key exchange
    0 references
    elliptic curves
    0 references
    isogenies
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers