A review of mathematical and computational aspects of CSIDH algorithms
From MaRDI portal
Publication:6580190
Recommendations
Cites work
- scientific article; zbMATH DE number 3977160 (Why is no real title available?)
- scientific article; zbMATH DE number 1042857 (Why is no real title available?)
- scientific article; zbMATH DE number 1047203 (Why is no real title available?)
- scientific article; zbMATH DE number 1440061 (Why is no real title available?)
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- A faster way to the CSIDH
- A lower bound on the length of signatures based on group actions and generic isogenies
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- Abelian varieties over finite fields
- Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves
- Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Binary quadratic forms. An algorithmic approach
- CSI-FiSh: efficient isogeny based signatures through class group computations
- CSIDH on the surface
- CSIDH: an efficient post-quantum commutative group action
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
- Constructing elliptic curve isogenies in quantum subexponential time
- Elliptic curves and their applications to cryptography. An introduction
- Elliptic curves. Number theory and cryptography
- Endomorphisms of Abelian varieties over finite fields
- Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation
- Faster computation of isogenies of large prime degree
- Finding closest lattice vectors using approximate Voronoi cells
- Full quantum equivalence of group action DLog and CDH, and more
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- He gives C-sieves on the CSIDH
- Horizontal racewalking using radical isogenies
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- Isogeny volcanoes
- Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512
- Modern computer algebra
- On Lovász' lattice reduction and the nearest lattice point problem
- On collisions related to an ideal class of order 3 in CSIDH
- On lions and elligators: an efficient constant-time implementation of CSIDH
- Optimal strategies for CSIDH
- Polynomial multiplication over finite fields in time \(O(n\log n)\)
- Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies
- Radical isogenies
- Rational isogenies from irrational endomorphisms
- SCALLOP: scaling the CSI-FiSh
- SeaSign: compact isogeny signatures from class group actions
- Sieving for closest lattice vectors (with preprocessing)
- Stronger and faster side-channel protections for CSIDH
- The Arithmetic of Elliptic Curves
- Towards practical key exchange from ordinary isogeny graphs
- Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
- Twisted Edwards Curves
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
This page was built for publication: A review of mathematical and computational aspects of CSIDH algorithms
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6580190)