A quantum algorithm for computing isogenies between supersingular elliptic curves

JF Biasse, D Jao, A Sankar - International Conference on Cryptology in …, 2014 - Springer
In this paper, we describe a quantum algorithm for computing an isogeny between any two
supersingular elliptic curves defined over a given finite field. The complexity of our method is …

Concrete quantum cryptanalysis of binary elliptic curves

G Banegas, DJ Bernstein, I Van Hoof… - Cryptology ePrint …, 2020 - eprint.iacr.org
This paper analyzes and optimizes quantum circuits for computing discrete logarithms on
binary elliptic curves, including reversible circuits for fixed-base-point scalar multiplication …

CSIDH: an efficient post-quantum commutative group action

W Castryck, T Lange, C Martindale, L Panny… - Advances in Cryptology …, 2018 - Springer
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …

Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

Quantum security analysis of CSIDH

X Bonnetain, A Schrottenloher - … on the Theory and Applications of …, 2020 - Springer
CSIDH is a recent proposal for post-quantum non-interactive key-exchange, based on
supersingular elliptic curve isogenies. It is similar in design to a previous scheme by …

Quantum resource estimates for computing elliptic curve discrete logarithms

M Roetteler, M Naehrig, KM Svore, K Lauter - Advances in Cryptology …, 2017 - Springer
We give precise quantum resource estimates for Shor's algorithm to compute discrete
logarithms on elliptic curves over prime fields. The estimates are derived from a simulation of …

Computing isogenies between Montgomery curves using the action of (0, 0)

J Renes - International Conference on Post-Quantum …, 2018 - Springer
A recent paper by Costello and Hisil at Asiacrypt'17 presents efficient formulas for computing
isogenies with odd-degree cyclic kernels on Montgomery curves. We provide a constructive …

A comparison of security and its performance for key agreements in post-quantum cryptography

F Borges, PR Reis, D Pereira - IEEE Access, 2020 - ieeexplore.ieee.org
Nowadays, we are surrounded by devices collecting and transmitting private information.
Currently, the two main mathematical problems that guarantee security on the Internet are …

Supersingular curves you can trust

A Basso, G Codogni, D Connolly, L De Feo… - … Conference on the …, 2023 - Springer
Generating a supersingular elliptic curve such that nobody knows its endomorphism ring is a
notoriously hard task, despite several isogeny-based protocols relying on such an object. A …

Genus two isogeny cryptography

EV Flynn, YB Ti - … Conference, PQCrypto 2019, Chongqing, China, May …, 2019 - Springer
Abstract We study (ℓ, ℓ)-isogeny graphs of principally polarised supersingular abelian
surfaces (PPSSAS). The (ℓ, ℓ)-isogeny graph has cycles of small length that can be used to …