Pages that link to "Item:Q5853789"
From MaRDI portal
The following pages link to Faster computation of isogenies of large prime degree (Q5853789):
Displaying 34 items.
- An efficient authenticated key exchange from random self-reducibility on CSIDH (Q831632) (← links)
- Compact, efficient and UC-secure isogeny-based oblivious transfer (Q2056684) (← links)
- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem (Q2056687) (← links)
- Simplified isogeny formulas on twisted Jacobi quartic curves (Q2066406) (← links)
- Optimal strategies for CSIDH (Q2085717) (← links)
- SimS: a simplification of SiGamal (Q2118549) (← links)
- Fully projective radical isogenies in constant-time (Q2152151) (← links)
- Optimizing the evaluation of \(\ell\)-isogenous curve for isogeny-based cryptography (Q2169440) (← links)
- Fast computation of the \(N\)-th term of a \(q\)-holonomic sequence and applications (Q2674000) (← links)
- \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space (Q2685697) (← links)
- SQISign: compact post-quantum signatures from quaternions and isogenies (Q2692337) (← links)
- B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion (Q2692391) (← links)
- Radical isogenies (Q2692393) (← links)
- An Interactive Tool to Explore and Improve the Ply Number of Drawings (Q4625099) (← links)
- Explicit construction of the square-root Vélu's formula on Edwards curves (Q5047146) (← links)
- Isogeny Computation on Twisted Jacobi Intersections (Q5095921) (← links)
- High-degree Compression Functions on Alternative Models of Elliptic Curves and their Applications (Q5862340) (← links)
- Séta: Supersingular Encryption from Torsion Attacks (Q6041286) (← links)
- Supersingular curves you can trust (Q6061368) (← links)
- Proving knowledge of isogenies: a survey (Q6063129) (← links)
- How to construct CSIDH on Edwards curves (Q6063264) (← links)
- SCALLOP: scaling the CSI-FiSh (Q6070766) (← links)
- Disorientation faults in CSIDH (Q6083667) (← links)
- A direct key recovery attack on SIDH (Q6083674) (← links)
- Breaking SIDH in polynomial time (Q6083675) (← links)
- New algorithms for the Deuring correspondence. Towards practical and secure SQISign signatures (Q6083684) (← links)
- Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling (Q6108793) (← links)
- A new isogeny representation and applications to cryptography (Q6132404) (← links)
- Improvement of the square-root Vélu's formulas for isogeny-based cryptography (Q6139479) (← links)
- Fast norm computation in smooth-degree abelian number fields (Q6142769) (← links)
- DeCSIDH: delegating isogeny computations in the CSIDH setting (Q6157595) (← links)
- Parallel isogeny path finding with limited memory (Q6169469) (← links)
- On the key generation in $\mathbf{SQISign}$ (Q6196948) (← links)
- On the feasibility of computing constructive Deuring correspondence (Q6196949) (← links)