A new isogeny representation and applications to cryptography
From MaRDI portal
Publication:6132404
Recommendations
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion
- An alternative approach for SIDH arithmetic
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- scientific article; zbMATH DE number 7623644
- Identification protocols and signature schemes based on supersingular isogeny problems
Cites work
- scientific article; zbMATH DE number 3356934 (Why is no real title available?)
- A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
- A new adaptive attack on SIDH
- A quantum algorithm for computing isogenies between supersingular elliptic curves
- Abelian varieties over finite fields
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs
- Constructing elliptic curve isogenies in quantum subexponential time
- Counting points on elliptic curves over finite fields
- Delay encryption
- Faster algorithms for isogeny problems using torsion point images
- Faster computation of isogenies of large prime degree
- Identification protocols and signature schemes based on supersingular isogeny problems
- Improved torsion-point attacks on SIDH variants
- Isogeny-based quantum-resistant undeniable signatures
- Oblivious pseudorandom functions from isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- On the isogeny problem with torsion point information
- On the quaternion \(\ell\)-isogeny path problem
- One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols
- Orienting supersingular isogeny graphs
- Quaternion algebras
- SQISign: compact post-quantum signatures from quaternions and isogenies
- SeaSign: compact isogeny signatures from class group actions
- Supersingular isogeny graphs and endomorphism rings: reductions and solutions
- Séta: Supersingular Encryption from Torsion Attacks
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Verifiable delay functions from supersingular isogenies and pairings
Cited in
(20)- Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves
- Climbing and descending tall isogeny volcanos
- Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH
- A Tightly Secure Identity-Based Signature Scheme from Isogenies
- On the Security of Supersingular Isogeny Cryptosystems
- New SIDH countermeasures for a more efficient key exchange
- Cryptographic group actions and applications
- Towards a quantum-resistant weak verifiable delay function
- Efficient isogeny proofs using generic techniques
- scientific article; zbMATH DE number 7274000 (Why is no real title available?)
- Generalization of Isomorphism of Polynomials with Two Secrets and Its Application to Public Key Encryption
- On the feasibility of computing constructive Deuring correspondence
- \textsf{FESTA}: fast encryption from supersingular torsion attacks
- SCALLOP-HD: group action from 2-dimensional isogenies
- Isogeny problems with level structure
- SCALLOP: scaling the CSI-FiSh
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures
- Effective pairings in isogeny-based cryptography
- New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves
- On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography
This page was built for publication: A new isogeny representation and applications to cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6132404)