Constructing canonical strategies for parallel implementation of isogeny based cryptography
From MaRDI portal
Publication:1738054
DOI10.1007/978-3-030-05378-9_10zbMath1407.94122OpenAlexW2902904593MaRDI QIDQ1738054
Koray Karabina, Aaron Hutchinson
Publication date: 29 March 2019
Full work available at URL: https://doi.org/10.1007/978-3-030-05378-9_10
Cryptography (94A60) Applications to coding theory and cryptography of arithmetic geometry (14G50) Theta functions and curves; Schottky problem (14H42)
Related Items (3)
Speeding-up parallel computation of large smooth-degree isogeny using precedence-constrained scheduling ⋮ How not to create an isogeny-based PAKE ⋮ Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
This page was built for publication: Constructing canonical strategies for parallel implementation of isogeny based cryptography