Recently, supersingular isogeny cryptosystems have received attention as a candidate of post-quantum cryptography (PQC). Their security relies on the hardness of solving isogeny problems over supersingular elliptic curves. The meet-in-the-middle approach seems the most practical to solve isogeny problems with classical computers. In this paper, we propose two algebraic approaches for isogeny problems of prime power degrees. Our strategy is to reduce isogeny problems to a system of algebraic equations, and to solve it by Gröbner basis computation. The first one uses modular polynomials, and the second one uses kernel polynomials of isogenies. We report running times for solving isogeny problems of 3-power degrees on supersingular elliptic cu...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
Finding isogenies between supersingular elliptic curves is a natural algorithmic problem which is kn...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
The isogeny path-finding is a computational problem that finds an isogeny connecting two given isoge...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
Given two ordinary elliptic curves over a finite field having the same cardinality and endomorphism ...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
The Isogeny to Endomorphism Ring Problem (IsERP) asks to compute the endomorphism ring of the codoma...
Finding isogenies between supersingular elliptic curves is a natural algorithmic problem which is kn...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
We present an overview of supersingular isogeny cryptography and how it fits into the broad theme of...
The isogeny path-finding is a computational problem that finds an isogeny connecting two given isoge...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
Given two ordinary elliptic curves over a finite field having the same cardinality and endomorphism ...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...
An important open problem in supersingular isogeny-based cryptography is to produce, without a trust...