Abstract. For certain security applications, including identity based encryption and short signature schemes, it is useful to have abelian varieties with security parameters that are neither too small nor too large. Supersingular abelian varieties are natural candidates for these applications. This paper determines exactly which values can occur as the security parameters of supersingular abelian varieties (in terms of the dimension of the abelian variety and the size of the finite field), and gives constructions of supersingular abelian varieties that are optimal for use in cryptography.
Abstract. Frey and Rück gave a method to transform the discrete logarithm problem in the divisor cl...
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element o...
International audienceWe investigate special structures due to automorphisms in isogeny graphs of pr...
Abstract. We show that supersingular abelian varieties can be used to obtain higher MOV security per...
We study cryptosystems based on supersingular isogenies. This is an active area of research in post-...
Abelian varieties can be classified via their moduli. In positive characteristic the structure of th...
The main objects of study in this thesis are abelian varieties and their endomorphism rings. Abelian...
We introduce and study a new way to catagorize supersingular abelian varieties defined over a finite...
Thesis (Ph.D.)--University of Washington, 2018An elliptic curve $E$ over a finite field $\FF_q$ is c...
Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the pa...
We present Séta (To be pronounced [ʃe:tɒ] meaning “walk” in Hungarian.), a new family of public-key ...
Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the pa...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
This monograph presents a comprehensive treatment of recent results on algebraic geometry as they ap...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
Abstract. Frey and Rück gave a method to transform the discrete logarithm problem in the divisor cl...
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element o...
International audienceWe investigate special structures due to automorphisms in isogeny graphs of pr...
Abstract. We show that supersingular abelian varieties can be used to obtain higher MOV security per...
We study cryptosystems based on supersingular isogenies. This is an active area of research in post-...
Abelian varieties can be classified via their moduli. In positive characteristic the structure of th...
The main objects of study in this thesis are abelian varieties and their endomorphism rings. Abelian...
We introduce and study a new way to catagorize supersingular abelian varieties defined over a finite...
Thesis (Ph.D.)--University of Washington, 2018An elliptic curve $E$ over a finite field $\FF_q$ is c...
Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the pa...
We present Séta (To be pronounced [ʃe:tɒ] meaning “walk” in Hungarian.), a new family of public-key ...
Modern communications heavily rely on cryptography to ensure data integrity and privacy. Over the pa...
Post-Quantum Cryptography studies cryptographic algorithms that quantum computers cannot break. Rece...
This monograph presents a comprehensive treatment of recent results on algebraic geometry as they ap...
In this paper we present a new family of Jacobian Varieties defined over finite fields that provides...
Abstract. Frey and Rück gave a method to transform the discrete logarithm problem in the divisor cl...
The value of the Tate pairing on an elliptic curve over a finite field may be viewed as an element o...
International audienceWe investigate special structures due to automorphisms in isogeny graphs of pr...