Graphs and pairings of elliptic curves

M Mula - 2024 - iris.unitn.it
Most isogeny-based cryptosystems ultimately rely, for their security, on ℓ-IsoPath, ie the
problem of finding a secret ℓ-smooth isogeny between two elliptic curves. As cryptographic …