In this paper, we describe an algorithm to compute chains of $(2,2)$-isogenies between products of elliptic curves in the theta model. The description of the algorithm is split into various subroutines to allow for a precise field operation counting. We present a constant time implementation of our algorithm in Rust and an alternative implementation in SageMath. Our work in SageMath runs ten times faster than a comparable implementation of an isogeny chain using the Richelot correspondence. The Rust implementation runs up to forty times faster than the equivalent isogeny in SageMath and has been designed to be portable for future research in higher-dimensional isogeny-based cryptography
Finding isogenies between supersingular elliptic curves is a natural algorithmic problem which is kn...
Computing isogenies between elliptic curves is a significantpart of post-quantum cryptography with m...
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathemati...
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of el...
We use theta groups to study $2$-isogenies between Kummer lines, with a particular focus on the Mont...
Accepté pour publication à Mathematics of ComputationsInternational audienceIn this paper, we comput...
A recent paper by Costello and Hisil at Asiacrypt\u2717 presents efficient formulas for computing is...
International audienceThe problem of computing an explicit isogeny between two given elliptic curves...
AbstractThe problem of computing an explicit isogeny between two given elliptic curves over Fq, orig...
We survey algorithms for computing isogenies between elliptic curves defined over a field of charact...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Mont...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
Finding isogenies between supersingular elliptic curves is a natural algorithmic problem which is kn...
Computing isogenies between elliptic curves is a significantpart of post-quantum cryptography with m...
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathemati...
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between products of el...
We use theta groups to study $2$-isogenies between Kummer lines, with a particular focus on the Mont...
Accepté pour publication à Mathematics of ComputationsInternational audienceIn this paper, we comput...
A recent paper by Costello and Hisil at Asiacrypt\u2717 presents efficient formulas for computing is...
International audienceThe problem of computing an explicit isogeny between two given elliptic curves...
AbstractThe problem of computing an explicit isogeny between two given elliptic curves over Fq, orig...
We survey algorithms for computing isogenies between elliptic curves defined over a field of charact...
International audienceThis paper focuses on isogeny representations, defined as ways to evaluate iso...
We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Mont...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Since the mid 1980's, abelian varieties have been widely used in cryptography: the discrete logarith...
Depuis le milieu des années 1980, les variétés abéliennes ont été abondamment utilisées en cryptogra...
Finding isogenies between supersingular elliptic curves is a natural algorithmic problem which is kn...
Computing isogenies between elliptic curves is a significantpart of post-quantum cryptography with m...
Isogenies, the mappings of elliptic curves, have become a useful tool in cryptology. These mathemati...