… Now is the right time for quantumalgorithms experts to learn … This separation of ellipticcurves into supersingular and ordinary … final remarks about supersingularellipticcurves. First, any …
L De Feo, D Jao, J Plût - Journal of Mathematical Cryptology, 2014 - degruyter.com
… We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingularellipticcurves. The main …
JF Biasse, D Jao, A Sankar - International Conference on Cryptology in …, 2014 - Springer
… quantumalgorithm for computing an isogeny between any two supersingularellipticcurves … both classical and quantum computers). We also discuss the cryptographic relevance of our …
… is a natural algorithmic problem which is known to be equivalent to computing the curves… supersingularellipticcurves over Fp2 . We present improved classical and quantumalgorithms …
… which was shown to be vulnerable are what are called supersingularellipticcurves. For … For a detailed implementation of a polynomial time quantumalgorithm for the ellipticcurve …
A Childs, D Jao, V Soukharev - Journal of Mathematical Cryptology, 2014 - degruyter.com
… -time quantumalgorithm for constructing nonzero isogenies between two such ellipticcurves… of cryptographic protocols based on isogenies between supersingularcurves [17], and it …
… against quantum attacks. The fastest known quantum attack on CSSI is Tani’s algorithm [26]… N\) and \(\# Y \gg N\), Tani’s quantumalgorithm finds a claw, ie, a pair \((x_1,x_2) \in X_1 \…
P Kaye, C Zalka - arXiv preprint quant-ph/0407095, 2004 - arxiv.org
… quantumalgorithm for discrete logarithms applied to ellipticcurve groups forms the basis of a “quantum attack” of elliptic … the case of a supersingularcurve). The set of points on a given …
… begins by providing a brief introduction to ellipticcurves, isogenies, and the SIDH … supersingularellipticcurves, which are important for visualizing the isogeny graphs in the algorithm …