Abstract. Let O be a maximal order in a definite quaternion algebra over Q of prime discriminant p, and ` a small prime. We describe a probabilistic algorithm, which for a given left O-ideal, computes a repre-sentative in its left ideal class of `-power norm. In practice the algorithm is efficient, and subject to heuristics on expected distributions of primes, runs in expected polynomial time. This breaks the underlying problem for a quaternion analog of the Charles-Goren-Lauter hash function, and has security implications for the original CGL construction in terms of supersingular elliptic curves.
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
International audienceDeciding whether an ideal of a number field is principal and finding a generat...
International audienceLet $\mathcal{O}$ be a maximal order in a definite quaternion algebra over $\m...
Let O be a maximal order in a definite quaternion algebra over ℚ of prime discriminant p, and l a sm...
Let O be a maximal order in a definite quaternion algebra over ℚ of prime discriminant p, and l a sm...
International audienceWe prove that the path-finding problem in isogeny graphs and the endomorphism ...
We prove that the path-finding problem in isogeny graphs and the endomorphism ring problem for super...
We prove that the path-finding problem in $\ell$-isogeny graphs and the endomorphism ring problem fo...
Abstract. We provide algorithms to count and enumerate representatives of the (right) ideal classes ...
Deciding whether an ideal of a number field is principal and finding a generator is a fundamental pr...
In this paper, we study several related computational problems for supersingular elliptic curves, th...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
International audienceDeciding whether an ideal of a number field is principal and finding a generat...
International audienceLet $\mathcal{O}$ be a maximal order in a definite quaternion algebra over $\m...
Let O be a maximal order in a definite quaternion algebra over ℚ of prime discriminant p, and l a sm...
Let O be a maximal order in a definite quaternion algebra over ℚ of prime discriminant p, and l a sm...
International audienceWe prove that the path-finding problem in isogeny graphs and the endomorphism ...
We prove that the path-finding problem in isogeny graphs and the endomorphism ring problem for super...
We prove that the path-finding problem in $\ell$-isogeny graphs and the endomorphism ring problem fo...
Abstract. We provide algorithms to count and enumerate representatives of the (right) ideal classes ...
Deciding whether an ideal of a number field is principal and finding a generator is a fundamental pr...
In this paper, we study several related computational problems for supersingular elliptic curves, th...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
The quantum computer is a threat to cryptography as it can solve the problems upon which relies the ...
International audienceDeciding whether an ideal of a number field is principal and finding a generat...