Computational problems in supersingular elliptic curve isogenies
DOI10.1007/S11128-018-2023-6zbMATH Open1400.81083OpenAlexW2889320120MaRDI QIDQ1994699FDOQ1994699
Authors: Steven D. Galbraith, Frederik Vercauteren
Publication date: 1 November 2018
Published in: Quantum Information Processing (Search for Journal in Brave)
Full work available at URL: https://lirias.kuleuven.be/handle/123456789/628094
Recommendations
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Supersingular isogeny-based cryptography: a survey
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Cryptography (94A60) Curves over finite and local fields (11G20) Number-theoretic algorithms; complexity (11Y16) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94) Elliptic curves (14H52)
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Post-Quantum Cryptography
- Elliptic curves. Number theory and cryptography
- Mathematics of public key cryptography.
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Cryptographic hash functions from expander graphs
- Title not available (Why is that?)
- Computing the endomorphism ring of an ordinary elliptic curve over a finite field
- Improved algorithm for the isogeny problem for ordinary elliptic curves
- Constructing Isogenies between Elliptic Curves Over Finite Fields
- Title not available (Why is that?)
- Constructing elliptic curve isogenies in quantum subexponential time
- Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves
- A low-memory algorithm for finding short product representations in finite groups.
- Title not available (Why is that?)
- Identifying the matrix ring: algorithms for quaternion algebras and quadratic forms
- Isogeny volcanoes
- Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation
- Title not available (Why is that?)
- Ramanujan graphs and Hecke operators
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Quantum resource estimates for computing elliptic curve discrete logarithms
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- Identification protocols and signature schemes based on supersingular isogeny problems
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Computing and Combinatorics
- Constructing supersingular elliptic curves
- Claw finding algorithms using quantum walk
- Isogeny-based quantum-resistant undeniable signatures
- Faster algorithms for isogeny problems using torsion point images
- Efficient compression of SIDH public keys
- On fast calculation of addition chains for isogeny-based cryptography
- On the quaternion \(\ell\)-isogeny path problem
Cited In (28)
- Supersingular isogeny graphs in cryptography
- An efficient authenticated key exchange from random self-reducibility on CSIDH
- Rational isogenies from irrational endomorphisms
- The elliptic scalar multiplication graph and its application in elliptic curve cryptography
- Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- On the hardness of the computational ring-LWR problem and its applications
- Orienting supersingular isogeny graphs
- Algebraic approaches for solving isogeny problems of prime power degrees
- SIDH proof of knowledge
- Patient zero \& patient six: zero-value and correlation attacks on CSIDH and SIKE
- A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
- An efficient key recovery attack on SIDH
- Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
- General linear group action on tensors: a candidate for post-quantum cryptography
- Delay encryption
- Supersingular isogeny-based cryptography: a survey
- Research development on efficient elliptic curve isogenous computations
- Constructing elliptic curve isogenies in quantum subexponential time
- The security of all private-key bits in isogeny-based schemes
- Oblivious pseudorandom functions from isogenies
- Post-quantum primitives in information security
- Verifiable isogeny walks: towards an isogeny-based postquantum VDF
- CSIDH: an efficient post-quantum commutative group action
- Eliptic curves in post-quantum cryptography
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
Uses Software
This page was built for publication: Computational problems in supersingular elliptic curve isogenies
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1994699)