On the cost of computing isogenies between supersingular elliptic curves

G Adj, D Cervantes-Vázquez… - … Conference on Selected …, 2018 - Springer
… Feo Supersingular Isogeny Diffie-Hellman (SIDH) key agreement scheme is based on the
intractability of the Computational Supersingular … We will denote the elliptic curve that Vélu’s …

On oriented supersingular elliptic curves

H Onuki - Finite Fields and Their Applications, 2021 - Elsevier
… protocol using supersingular elliptic curves, named SIDH (Supersingular Isogeny … SIDH).
CSIDH uses an action of an ideal class group on a set of classes of supersingular elliptic curves

A note on the ending elliptic curve in SIDH

C Leonardi - Cryptology ePrint Archive, 2020 - eprint.iacr.org
elliptic curves, given a representation of their kernel. In the initial supersingular isogeny-based
key agreement protocol, SIDH [2]… and then use the final elliptic curve in each sequence to …

Séta: supersingular encryption from torsion attacks

L De Feo, C Delpech de Saint Guilhem… - Advances in Cryptology …, 2021 - Springer
… Let p be a prime number; for simplicity we restrict to supersingular elliptic curves defined
over \(\… 2 we recall basic properties of supersingular elliptic curves and the SIDH protocol. …

B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion

C Costello - Advances in Cryptology–ASIACRYPT 2020: 26th …, 2020 - Springer
… The best known attacks against Jao and De Feo’s SIDH protocol [23] try to recover either …
the supersingular isogeny problem: given a finite field K and two supersingular elliptic curves \(…

Generating Supersingular Elliptic Curves over with Unknown Endomorphism Ring

Y Mokrani, D Jao - Cryptology ePrint Archive, 2023 - eprint.iacr.org
… One such piece of information is the endomorphism ring of the starting elliptic curve. In fact,
… on SIDH [17] also need a known endomorphism ring. Since many current attacks on SIDH all …

Torsion point attacks on 'SIDH‐like'cryptosystems

P Kutas, C Petit - IET Information Security, 2023 - Wiley Online Library
… long time, but the SSI-T problem is specific to SIDH and its variants. It is natural to wonder how
the … results on supersingular elliptic curves, quaternion algebras and the SIDH protocol. In …

Generating Supersingular Elliptic Curves over  with Unknown Endomorphism Ring

Y Mokrani, D Jao - International Conference on Cryptology in India, 2023 - Springer
… Recent attacks on SIDH by … two supersingular elliptic curves. It follows that, for an isogeny
based scheme to be secure, it must avoid giving too much information about its elliptic curves

Theoretical foundations of cryptosystems based on isogenies of supersingular elliptic curves

J Oupický - 2022 - dspace.cuni.cz
SIDH. We also present statements about ordinary and supersingular curves that are specific
to CSIDH and SIDH… after understanding CSIDH we believe SIDH is easier to comprehend. …

[PDF][PDF] Protocol Construction and Parameter Selection for Supersingular Elliptic Curve Isogeny-based Cryptography

B Sterner - inspirehep.net
… exchange protocol SIDH formed the … supersingular elliptic curves and every such curve has
a representation that is defined over p2 , we can assume that all supersingular elliptic curves