Expander graphs based on GRH with an application to elliptic curve cryptography

From MaRDI portal
Revision as of 21:52, 30 January 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:1019852

DOI10.1016/j.jnt.2008.11.006zbMath1228.05167arXiv0811.0647OpenAlexW2100201258MaRDI QIDQ1019852

Stephen D. Miller, Ramarathnam Venkatesan, David D. W. Yao

Publication date: 28 May 2009

Published in: Journal of Number Theory (Search for Journal in Brave)

Full work available at URL: https://arxiv.org/abs/0811.0647




Related Items (26)

The elliptic scalar multiplication graph and its application in elliptic curve cryptographyQuantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsPseudorandom numbers and hash functions from iterations of multivariate polynomialsA Survey on some Applications of Graph Theory in CryptographyImproved algorithm for the isogeny problem for ordinary elliptic curvesIsolated elliptic curves and the MOV attackSéta: Supersingular Encryption from Torsion AttacksA proof of the conjectured run time of the Hafner-McCurley class group algorithmA subexponential-time, polynomial quantum space algorithm for inverting the CM group actionGenerating subgroups of ray class groups with small prime idealsComputing the endomorphism ring of an ordinary elliptic curve over a finite fieldFast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluationTowards practical key exchange from ordinary isogeny graphsCSIDH: an efficient post-quantum commutative group actionUnnamed ItemA low-memory algorithm for finding short product representations in finite groups.Post-quantum static-static key agreement using multiple protocol instancesIsogeny graphs of ordinary abelian varietiesShort Stickelberger Class Relations and Application to Ideal-SVPA trade-off between classical and quantum circuit size for an attack against CSIDHComputing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)An Average Case NP-complete Graph Colouring ProblemThreshold schemes from isogeny assumptionsComputing endomorphism rings of elliptic curves under the GRHRandom self-reducibility of ideal-SVP via Arakelov random walks



Cites Work




This page was built for publication: Expander graphs based on GRH with an application to elliptic curve cryptography