Adventures in supersingularland

S Arpin, C Camacho-Navarro, K Lauter… - Experimental …, 2023 - Taylor & Francis
Abstract Supersingular Isogeny Graphs were introduced as a source of hard problems in
cryptography by Charles, Goren, and Lauter for the construction of cryptographic hash …

Arithmetic considerations for isogeny-based cryptography

JW Bos, SJ Friedberger - IEEE Transactions on Computers, 2018 - ieeexplore.ieee.org
In this paper we investigate various arithmetic techniques which can be used to potentially
enhance the performance in the supersingular isogeny Diffie-Hellman (SIDH) key-exchange …

[PDF][PDF] Efficient implementations of a quantum-resistant key-exchange protocol on embedded systems

R Azarderakhsh, D Fishbein, D Jao - Center of Applied Cryptographic …, 2014 - Citeseer
Presence of quantum computers is a real threat against the security of currently used public
key cryptographic algorithms such as RSA and Elliptic curve cryptography. Isogeny …

Identifying supersingular elliptic curves

AV Sutherland - LMS Journal of Computation and Mathematics, 2012 - cambridge.org
Given an elliptic curve E over a field of positive characteristic p, we consider how to
efficiently determine whether E is ordinary or supersingular. We analyze the complexity of …

New hybrid method for isogeny-based cryptosystems using Edwards curves

S Kim, K Yoon, J Kwon, YH Park… - IEEE transactions on …, 2019 - ieeexplore.ieee.org
Along with the resistance against quantum computers, isogeny-based cryptography offers
attractive cryptosystems due to small key sizes and compatibility with the current elliptic …

Fast Arithmetic Modulo 2^ xp^ y±1

JW Bos, S Friedberger - 2017 IEEE 24th Symposium on …, 2017 - ieeexplore.ieee.org
We give a systematic overview of techniques to compute arithmetic modulo 2 xpy±1 and
propose improvements. This is useful for computations in the supersingular isogeny Diffie …

Genus-2 curves and Jacobians with a given number of points

R Bröker, EW Howe, KE Lauter… - LMS Journal of …, 2015 - cambridge.org
Genus-2 curves and Jacobians with a given number of points Page 1 LMS J. Comput. Math.
18 (1) (2015) 170–197 C 2015 Authors doi:10.1112/S1461157014000461 Genus-2 curves …

Simple oblivious transfer protocols compatible with supersingular isogenies

V Vitse - Progress in Cryptology–AFRICACRYPT 2019: 11th …, 2019 - Springer
The key exchange protocol of Diffie and Hellman, which can be defined for any group, has
the special feature of using only exponentiations. In particular, it can also be instantiated in …

General fault attacks on multivariate public key cryptosystems

Y Hashimoto, T Takagi, K Sakurai - … 29–December 2, 2011. Proceedings 4, 2011 - Springer
The multivariate public key cryptosystem (MPKC), which is based on the problem of solving
a set of multivariate systems of quadratic equations over a finite field, is expected to be …

Elliptic curve isogeny-based cryptographic scheme

V Soukharev - US Patent 10,673,631, 2020 - Google Patents
Elliptic curve cryptographic schemes performed between a pair of cryptographic
correspondent computing devices. In an aspect, a first entity generates a first basis point in a …