Computing isogenies between Montgomery curves using the action of \((0,0)\)
From MaRDI portal
Publication:1644766
DOI10.1007/978-3-319-79063-3_11zbMath1425.94070OpenAlexW2794462176MaRDI QIDQ1644766
Publication date: 22 June 2018
Full work available at URL: https://doi.org/10.1007/978-3-319-79063-3_11
Algebraic coding theory; cryptography (number-theoretic aspects) (11T71) Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (16)
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems ⋮ CSIDH on the Surface ⋮ Quantum lattice enumeration and tweaking discrete pruning ⋮ On the hardness of the computational ring-LWR problem and its applications ⋮ On the statistical leak of the GGH13 multilinear map and some variants ⋮ \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space ⋮ Radical isogenies ⋮ Towards practical key exchange from ordinary isogeny graphs ⋮ CSIDH: an efficient post-quantum commutative group action ⋮ Computing supersingular isogenies on Kummer surfaces ⋮ Path planning with objectives minimum length and maximum clearance ⋮ Isogenies on twisted Hessian curves ⋮ Improved classical cryptanalysis of SIKE in practice ⋮ Delay encryption ⋮ CSURF-TWO: CSIDH for the ratio \((2:1)\) ⋮ SimS: a simplification of SiGamal
This page was built for publication: Computing isogenies between Montgomery curves using the action of \((0,0)\)