Le problème du calcul d'isogénies est apparu dans l'algorithme SEA de comptage de points de courbes elliptiques définies sur des corps finis. L'apparition de nouvelles applications du calcul d'isogénies (crypto système à trappe, fonction de hachage, accélération de la multiplication scalaire, crypto système post quantique) ont motivé par ailleurs la recherche d'algorithmes plus rapides en dehors du contexte SEA. L'algorithme de Couveignes (1996), malgré ses améliorations par De Feo (2011), présente la meilleure complexité en le degré de l'isogénie mais ne peut s'appliquer dans le cas de grande caractéristique.L'objectif de cette thèse est donc de présenter une modification de l'algorithme de Couveignes (1996) utilisable en toute caractérist...
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Never-...
This paper introduces a new approach to computing isogenies called radical isogenies and a corresp...
At a combined computational expense of about $6{\ell}$ field operations, Vélu\u27s formulas are used...
Les couplages ont été utilisés pour la première fois en cryptographie pour des attaquer le problème ...
Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $\ell$-isogenies...
Abstract. Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are `-isog...
In this thesis we apply techniques from computer algebra and language theory to speed up the element...
This paper is devoted to the study of the volcanoes of l-isogenies of elliptic curves over a finite...
This paper is devoted to the study of the volcanoes of ℓ-isogenies of elliptic curves over a finite ...
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Cur...
PreprintWe present an extension to Couveignes algorithm that, given two elliptic curves E and E , pe...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
International audienceThe heart of the improvements of Elkies to Schoof's algorithm for computing th...
. In 1985, Schoof gave a deterministic polynomial time algorithm to compute the cardinality of an el...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Never-...
This paper introduces a new approach to computing isogenies called radical isogenies and a corresp...
At a combined computational expense of about $6{\ell}$ field operations, Vélu\u27s formulas are used...
Les couplages ont été utilisés pour la première fois en cryptographie pour des attaquer le problème ...
Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $\ell$-isogenies...
Abstract. Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are `-isog...
In this thesis we apply techniques from computer algebra and language theory to speed up the element...
This paper is devoted to the study of the volcanoes of l-isogenies of elliptic curves over a finite...
This paper is devoted to the study of the volcanoes of ℓ-isogenies of elliptic curves over a finite ...
The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Cur...
PreprintWe present an extension to Couveignes algorithm that, given two elliptic curves E and E , pe...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
International audienceThe heart of the improvements of Elkies to Schoof's algorithm for computing th...
. In 1985, Schoof gave a deterministic polynomial time algorithm to compute the cardinality of an el...
Les couplages sont des primitives cryptographiques qui interviennent désormais dans de nombreux prot...
Elliptic curve cryptosystems are nowadays widely used in the design of many security devices. Never-...
This paper introduces a new approach to computing isogenies called radical isogenies and a corresp...
At a combined computational expense of about $6{\ell}$ field operations, Vélu\u27s formulas are used...