Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves

From MaRDI portal
Publication:540365

DOI10.3934/amc.2010.4.215zbMath1213.94136OpenAlexW1987627958MaRDI QIDQ540365

Anton Stolbunov

Publication date: 3 June 2011

Published in: Advances in Mathematics of Communications (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.3934/amc.2010.4.215




Related Items

A key manipulation attack on some recent isogeny-based key agreement protocolsMultiradical isogeniesAutomorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graphOn Black-Box Extensions of Non-interactive Zero-Knowledge Arguments, and Signatures Directly from Simulation SoundnessCSIDH on the SurfaceThe cost to break SIKE: a comparative hardware-based analysis with AES and SHA-3Quantum lattice enumeration and tweaking discrete pruningOn the hardness of the computational ring-LWR problem and its applicationsAn isogeny-based ID protocol using structured public keysFully projective radical isogenies in constant-timeImproved algorithm for the isogeny problem for ordinary elliptic curvesOn the Isogeny Problem with Torsion Point InformationRadical Isogenies on Montgomery CurvesAlgebraic generalization of Diffie-Hellman key exchangeThe security of all private-key bits in isogeny-based schemesSéta: Supersingular Encryption from Torsion AttacksSupersingular curves you can trustA subexponential-time, polynomial quantum space algorithm for inverting the CM group actionHorizontal racewalking using radical isogeniesDeCSIDH: delegating isogeny computations in the CSIDH settingCryptographic group actions and applicationsExplicit isogenies in quadratic time in any characteristicTowards practical key exchange from ordinary isogeny graphsCSIDH: an efficient post-quantum commutative group actionQuantum algorithm design: techniques and applicationsEfficient post-quantum undeniable signature on 64-bit ARMSupersingular Isogeny-based Cryptography: A SurveyComputational problems in supersingular elliptic curve isogeniesOn oriented supersingular elliptic curvesPath planning with objectives minimum length and maximum clearanceA trade-off between classical and quantum circuit size for an attack against CSIDHAlgebraic approaches for solving isogeny problems of prime power degreesAnalogues of Vélu’s formulas for isogenies on alternate models of elliptic curvesComputing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)Neighborhood of the supersingular elliptic curve isogeny graph at \(j = 0\) and 1728Lossy CSI-fish: efficient signature scheme with tight reduction to decisional CSIDH-512Threshold schemes from isogeny assumptionsTowards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve IsogeniesEfficient Algorithms for Supersingular Isogeny Diffie-HellmanCurves, Jacobians, and cryptographyOptimal strategies for CSIDHAN IDENTITY-BASED ENCRYPTION SCHEME USING ISOGENY OF ELLIPTIC CURVESEfficient Finite Field Multiplication for Isogeny Based Post Quantum CryptographyA fusion algorithm for solving the hidden shift problem in finite abelian groupsHe gives C-sieves on the CSIDHQuantum security analysis of CSIDH




This page was built for publication: Constructing public-key cryptographic schemes based on class group action on a set of isogenous elliptic curves