Pages that link to "Item:Q4267918"
From MaRDI portal
The following pages link to Constructing Isogenies between Elliptic Curves Over Finite Fields (Q4267918):
Displaying 48 items.
- Improved algorithm for the isogeny problem for ordinary elliptic curves (Q360194) (← links)
- Computing isogeny volcanoes of composite degree (Q426552) (← links)
- A low-memory algorithm for finding short product representations in finite groups. (Q664395) (← links)
- Estimating isogenies on elliptic curves (Q755819) (← links)
- Trapdoor DDH groups from pairings and isogenies (Q832364) (← links)
- Recent progress on the elliptic curve discrete logarithm problem (Q908041) (← links)
- Expander graphs based on GRH with an application to elliptic curve cryptography (Q1019852) (← links)
- Cryptographic hash functions from expander graphs (Q1027970) (← links)
- Rational points on \(X^ +_ 0(N)\) and quadratic \(\mathbb Q\)-curves. (Q1396440) (← links)
- Avoiding side-channel attacks by computing isogenous and isomorphic elliptic curves (Q1616162) (← links)
- Quantum lattice enumeration and tweaking discrete pruning (Q1633464) (← links)
- On the hardness of the computational ring-LWR problem and its applications (Q1633465) (← links)
- Towards practical key exchange from ordinary isogeny graphs (Q1710681) (← links)
- CSIDH: an efficient post-quantum commutative group action (Q1710683) (← links)
- Computational problems in supersingular elliptic curve isogenies (Q1994699) (← links)
- Orienting supersingular isogeny graphs (Q2025334) (← links)
- Algebraic approaches for solving isogeny problems of prime power degrees (Q2027266) (← links)
- The structure of the group of rational points of an abelian variety over a finite field (Q2049061) (← links)
- New techniques for SIDH-based NIKE (Q2191209) (← links)
- Elliptic curve cryptography: the serpentine course of a paradigm shift (Q2430981) (← links)
- Cryptographic implications of Hess' generalized GHS attack (Q2502169) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- On the Security of Supersingular Isogeny Cryptosystems (Q2958115) (← links)
- Constructing Isogenies on Extended Jacobi Quartic Curves (Q2980870) (← links)
- Computing modular polynomials in quasi-linear time (Q3055173) (← links)
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies (Q3102781) (← links)
- Fast algorithms for computing isogenies between elliptic curves (Q3577024) (← links)
- On Avoiding ZVP-Attacks Using Isogeny Volcanoes (Q3605396) (← links)
- Computing isogenies between elliptic curves over $F_{p^n}$ using Couveignes's algorithm (Q4700202) (← links)
- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree (Q4827599) (← links)
- Easy Decision Diffie-Hellman Groups (Q4827630) (← links)
- A Subexponential Algorithm for Evaluating Large Degree Isogenies (Q4931651) (← links)
- Об алгоритмах построения изогений эллиптических кривых над конечными полями и их приложениях (Q4958987) (← links)
- AN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVES (Q5011308) (← links)
- Isogenies of Elliptic Curves Over Function Fields (Q5043809) (← links)
- Every finite abelian group is the group of rational points of an ordinary abelian variety over 𝔽₂, 𝔽₃ and 𝔽₅ (Q5055610) (← links)
- On the Isogeny Problem with Torsion Point Information (Q5087255) (← links)
- Computing endomorphism rings of abelian varieties of dimension two (Q5246850) (← links)
- More Discriminants with the Brezing-Weng Method (Q5504638) (← links)
- Identification protocols and signature schemes based on supersingular isogeny problems (Q5919490) (← links)
- Algebraic curves and cryptography (Q5921638) (← links)
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\) (Q5963365) (← links)
- Parallel isogeny path finding with limited memory (Q6169469) (← links)
- On the key generation in $\mathbf{SQISign}$ (Q6196948) (← links)
- Efficient isogeny proofs using generic techniques (Q6535120) (← links)
- Revisiting meet-in-the-middle cryptanalysis of SIDH/SIKE with application to the \$IKEp182 challenge (Q6619846) (← links)
- Faster cryptographic hash function from supersingular isogeny graphs (Q6619856) (← links)
- Climbing and descending tall isogeny volcanos (Q6653361) (← links)