CSIDH: an efficient post-quantum commutative group action

W Castryck, T Lange, C Martindale, L Panny… - Advances in Cryptology …, 2018 - Springer
We propose an efficient commutative group action suitable for non-interactive key exchange
in a post-quantum setting. Our construction follows the layout of the Couveignes–Rostovtsev …

Efficient algorithms for supersingular isogeny Diffie-Hellman

C Costello, P Longa, M Naehrig - … , Santa Barbara, CA, USA, August 14-18 …, 2016 - Springer
We propose a new suite of algorithms that significantly improve the performance of
supersingular isogeny Diffie-Hellman (SIDH) key exchange. Subsequently, we present a full …

Failing to hash into supersingular isogeny graphs

J Booher, R Bowden, J Doliskani… - The Computer …, 2024 - academic.oup.com
An important open problem in supersingular isogeny-based cryptography is to produce,
without a trusted authority, concrete examples of 'hard supersingular curves' that is …

-adic images of Galois for elliptic curves over (and an appendix with John Voight)

J Rouse, AV Sutherland… - Forum of Mathematics …, 2022 - cambridge.org
We discuss the-adic case of Mazur's 'Program B'over: the problem of classifying the possible
images of-adic Galois representations attached to elliptic curves E over, equivalently …

Multifunctional CRS Encryption Scheme on Isogenies of Non-Supersingular Edwards Curves

A Bessalov, S Abramov, V Sokolov… - … , Quantum, and Post …, 2023 - elibrary.kubg.edu.ua
A multifunctional cryptosystem RCNIE on isogenies of non-supersingular Edwards curves is
proposed, which solves the problems of Diffie-Hellman secret sharing, digital signature, and …

The supersingular isogeny problem in genus 2 and beyond

C Costello, B Smith - International Conference on Post-Quantum …, 2020 - Springer
Let A/F _p and A'/F _p be superspecial principally polarized abelian varieties of dimension
g> 1. For any prime ℓ ≠ p, we give an algorithm that finds a path ϕ: A → A'in the (ℓ,\dots, ℓ) …

Higher-degree supersingular group actions

M Chenu, B Smith - arXiv preprint arXiv:2107.08832, 2021 - arxiv.org
We investigate the isogeny graphs of supersingular elliptic curves over $\mathbb {F} _ {p^ 2}
$ equipped with a $ d $-isogeny to their Galois conjugate. These curves are interesting …

Effective pairings in isogeny-based cryptography

K Reijnders - … Conference on Cryptology and Information Security in …, 2023 - Springer
Pairings are useful tools in isogeny-based cryptography and have been used in SIDH/SIKE
and other protocols. As a general technique, pairings can be used to move problems about …

Efficient algorithms for isogeny sequences and their cryptographic applications

K Takashima - … Modelling for Next-Generation Cryptography: CREST …, 2018 - Springer
We summarize efficient isogeny sequence computations on elliptic and genus 2 Jacobians.
For cryptographic purposes, sequences of low-degree isogenies are important. Then we …

Supersingular isogeny Diffie–Hellman authenticated key exchange

A Fujioka, K Takashima, S Terada… - Information Security and …, 2019 - Springer
We propose two authenticated key exchange protocols from supersingular isogenies. Our
protocols are the first post-quantum one-round Diffie–Hellman type authenticated key …