Orientations and the supersingular endomorphism ring problem

B Wesolowski - Annual International Conference on the Theory and …, 2022 - Springer
We study two important families of problems in isogeny-based cryptography and how they
relate to each other: computing the endomorphism ring of supersingular elliptic curves, and …

On the isogeny problem with torsion point information

TB Fouotsa, P Kutas, SP Merz, YB Ti - IACR International Conference on …, 2022 - Springer
It has recently been rigorously proven (and was previously known under certain heuristics)
that the general supersingular isogeny problem reduces to the supersingular endomorphism …

A direct key recovery attack on SIDH

L Maino, C Martindale, L Panny, G Pope… - … Conference on the …, 2023 - Springer
We present an attack on SIDH utilising isogenies between polarized products of two
supersingular elliptic curves. In the case of arbitrary starting curve, our attack (discovered …

The supersingular endomorphism ring and one endomorphism problems are equivalent

A Page, B Wesolowski - Annual International Conference on the Theory …, 2024 - Springer
Abstract The supersingular Endomorphism Ring problem is the following: given a
supersingular elliptic curve, compute all of its endomorphisms. The presumed hardness of …

Rational isogenies from irrational endomorphisms

W Castryck, L Panny, F Vercauteren - … on the Theory and Applications of …, 2020 - Springer
In this paper, we introduce a polynomial-time algorithm to compute a connecting O O-ideal
between two supersingular elliptic curves over F _p F p with common F _p F p …

A polynomial time attack on instances of M-SIDH and FESTA

W Castryck, F Vercauteren - International Conference on the Theory and …, 2023 - Springer
The recent devastating attacks on SIDH rely on the fact that the protocol reveals the images
φ (P) and φ (Q) of the secret isogeny φ: E 0→ E on a basis {P, Q} of the N-torsion subgroup E …

An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH

M Chen, M Imran, G Ivanyos, P Kutas, A Leroux… - … Conference on the …, 2023 - Springer
Abstract The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the
endomorphism ring of the codomain of an isogeny between supersingular curves in …

Computational problems in supersingular elliptic curve isogenies

SD Galbraith, F Vercauteren - Quantum Information Processing, 2018 - Springer
We present an overview of supersingular isogeny cryptography and how it fits into the broad
theme of post-quantum public-key crypto. The paper also gives a brief tutorial of elliptic …

Failing to hash into supersingular isogeny graphs

J Booher, R Bowden, J Doliskani… - The Computer …, 2024 - academic.oup.com
An important open problem in supersingular isogeny-based cryptography is to produce,
without a trusted authority, concrete examples of 'hard supersingular curves' that is …