\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
From MaRDI portal
Publication:2685697
DOI10.1016/j.dam.2022.12.002OpenAlexW3013227807MaRDI QIDQ2685697
Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi, Kohei Nakagawa
Publication date: 22 February 2023
Published in: Discrete Applied Mathematics (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.dam.2022.12.002
Cryptography (94A60) Elliptic curves over local fields (11G07) Quantum cryptography (quantum-theoretic aspects) (81P94)
Related Items (1)
Cites Work
- How to construct CSIDH on Edwards curves
- The LLL algorithm. Survey and applications
- Computing isogenies between Montgomery curves using the action of \((0,0)\)
- A simple and compact algorithm for SIDH with arbitrary degree isogenies
- CSIDH: an efficient post-quantum commutative group action
- A faster way to the CSIDH
- He gives C-sieves on the CSIDH
- Quantum security analysis of CSIDH
- Optimized method for computing odd-degree isogenies on Edwards curves
- CSI-FiSh: efficient isogeny based signatures through class group computations
- Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
- Stronger and faster side-channel protections for CSIDH
- On Lions and elligators: an efficient constant-time implementation of CSIDH
- Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves
- Constructing Isogenies on Extended Jacobi Quartic Curves
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- A Rigorous Subexponential Algorithm For Computation of Class Groups
- The Arithmetic of Elliptic Curves
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- CSIDH on the Surface
- A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem
- Faster computation of isogenies of large prime degree
- Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
This page was built for publication: \( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space