C Leonardi - Cryptology ePrint Archive, 2020 - eprint.iacr.org
… elliptic curves, given a representation of their kernel. In the initial supersingular isogeny-based
key agreement protocol, SIDH [2]… and then use the final elliptic curve in each sequence to …