On oriented supersingular elliptic curves

H Onuki - Finite Fields and Their Applications, 2021 - Elsevier
We revisit theoretical background on OSIDH (Oriented Supersingular Isogeny Diffie-Hellman
protocol), which is an isogeny-based key-exchange protocol proposed by Colò and Kohel at …

A simple and compact algorithm for SIDH with arbitrary degree isogenies

C Costello, H Hisil - Advances in Cryptology–ASIACRYPT 2017: 23rd …, 2017 - Springer
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic
curves in Montgomery form. The formula lends itself to a simple and compact algorithm that …

New SIDH countermeasures for a more efficient key exchange

A Basso, TB Fouotsa - International Conference on the Theory and …, 2023 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) protocol has been the main and
most efficient isogeny-based encryption protocol, until a series of breakthroughs led to a …

[HTML][HTML] How to construct CSIDH on Edwards curves

T Moriya, H Onuki, T Takagi - Finite Fields and Their Applications, 2023 - Elsevier
CSIDH is an isogeny-based key exchange protocol proposed by Castryck et al. in 2018. It is
based on the ideal class group action on F p-isomorphism classes of Montgomery curves …

Orienting supersingular isogeny graphs

L Colo, D Kohel - Journal of Mathematical Cryptology, 2020 - degruyter.com
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of
the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs. As an …

An efficient key recovery attack on SIDH

W Castryck, T Decru - Annual International Conference on the Theory and …, 2023 - Springer
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH). The attack is based on Kani's “reducibility criterion” for isogenies from …

A faster way to the CSIDH

M Meyer, S Reith - Progress in Cryptology–INDOCRYPT 2018: 19th …, 2018 - Springer
Abstract Recently Castryck, Lange, Martindale, Panny, and Renes published CSIDH, a new
key exchange scheme using supersingular elliptic curve isogenies. Due to its small key …

On the cost of computing isogenies between supersingular elliptic curves

G Adj, D Cervantes-Vázquez… - … Conference on Selected …, 2018 - Springer
The security of the Jao-De Feo Supersingular Isogeny Diffie-Hellman (SIDH) key agreement
scheme is based on the intractability of the Computational Supersingular Isogeny (CSSI) …

Supersingular isogeny key exchange for beginners

C Costello - Selected Areas in Cryptography–SAC 2019: 26th …, 2020 - Springer
Supersingular Isogeny Key Exchange for Beginners | SpringerLink Skip to main content
Advertisement SpringerLink Account Menu Find a journal Publish with us Track your research …

[PDF][PDF] An efficient key recovery attack on SIDH (preliminary version).

W Castryck, T Decru - IACR Cryptol. ePrint Arch., 2022 - esat.kuleuven.be
We present an efficient key recovery attack on the Supersingular Isogeny Diffie–Hellman
protocol (SIDH), based on a “glue-and-split” theorem due to Kani. Our attack exploits the …