Weak instances of class group action based cryptography via self-pairings
DOI10.1007/978-3-031-38548-3_25MaRDI QIDQ6145971
Simon-Philipp Merz, Wouter Castryck, Marc Houben, Sam van Buuren, Marzio Mula, Frederik Vercauteren
Publication date: 2 February 2024
Published in: Advances in Cryptology – CRYPTO 2023 (Search for Journal in Brave)
Cryptography (94A60) Elliptic curves over global fields (11G05) Number-theoretic algorithms; complexity (11Y16) Special algebraic curves and curves of low genus (14H45) Elliptic curves (14H52) Curves over finite and local fields (11G20) Finite ground fields in algebraic geometry (14G15) Elliptic curves over local fields (11G07) Quantum cryptography (quantum-theoretic aspects) (81P94)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- The Tate pairing for abelian varieties over finite fields
- Nonsingular plane cubic curves over finite fields
- The discrete logarithm problem on elliptic curves of trace one
- The Magma algebra system. I: The user language
- CSIDH: an efficient post-quantum commutative group action
- The Weil pairing, and its efficient calculation
- Complex multiplication structure of elliptic curves
- On oriented supersingular elliptic curves
- Orienting supersingular isogeny graphs
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
- On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves
- Stronger and faster side-channel protections for CSIDH
- SiGamal: a supersingular isogeny-based PKE and its application to a PRF
- Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
- The Arithmetic of Elliptic Curves
- Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p
- A Remark Concerning m-Divisibility and the Discrete Logarithm in the Divisor Class Group of Curves
- CSIDH on the Surface
- On the Security of OSIDH
- Advances in Elliptic Curve Cryptography
- Abelian varieties over finite fields
- SCALLOP: scaling the CSI-FiSh
- An efficient key recovery attack on SIDH
- A direct key recovery attack on SIDH
- Breaking SIDH in polynomial time
This page was built for publication: Weak instances of class group action based cryptography via self-pairings