FESTA: fast encryption from supersingular torsion attacks
A Basso, L Maino, G Pope - International Conference on the Theory and …, 2023 - Springer
We introduce FESTA, an efficient isogeny-based public-key encryption (PKE) protocol based
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
on a constructive application of the SIDH attacks. At its core, FESTA is based on a novel …
A faster software implementation of SQISign
K Lin, W Wang, Z Xu, CA Zhao - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Isogeny-based cryptography is famous for its short key size. As one of the most compact
digital signatures, SQIsign (Short Quaternion and Isogeny Signature) is attractive among …
digital signatures, SQIsign (Short Quaternion and Isogeny Signature) is attractive among …
QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras
K Nakagawa, H Onuki - Annual International Cryptology Conference, 2024 - Springer
Abstract In 2023, Basso, Maino, and Pope proposed FESTA (Fast Encryption from
Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that …
Supersingular Torsion Attacks), an isogeny-based public-key encryption (PKE) protocol that …
SCALLOP-HD: group action from 2-dimensional isogenies
We present SCALLOP-HD, a novel group action that builds upon the recent SCALLOP
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
group action introduced by De Feo, Fouotsa, Kutas, Leroux, Merz, Panny and Wesolowski in …
The supersingular endomorphism ring and one endomorphism problems are equivalent
A Page, B Wesolowski - Annual International Conference on the Theory …, 2024 - Springer
Abstract The supersingular Endomorphism Ring problem is the following: given a
supersingular elliptic curve, compute all of its endomorphisms. The presumed hardness of …
supersingular elliptic curve, compute all of its endomorphisms. The presumed hardness of …
Isogeny problems with level structure
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
AprésSQI: extra fast verification for SQIsign using extension-field signing
We optimise the verification of the SQIsign signature scheme. By using field extensions in
the signing procedure, we are able to significantly increase the amount of available rational …
the signing procedure, we are able to significantly increase the amount of available rational …
An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between
products of elliptic curves in the theta model. The description of the algorithm is split into …
products of elliptic curves in the theta model. The description of the algorithm is split into …
Introducing Clapoti (s): Evaluating the isogeny class group action in polynomial time
A Page, D Robert - Cryptology ePrint Archive, 2023 - eprint.iacr.org
In this short note, we present a simplified (but slower) version Clapoti of Clapotis, whose full
description will appear later. Let 𝐸/𝔽_𝑞 be an elliptic curve with an effective primitive …
description will appear later. Let 𝐸/𝔽_𝑞 be an elliptic curve with an effective primitive …
Finding orientations of supersingular elliptic curves and quaternion orders
An oriented supersingular elliptic curve is a curve which is enhanced with the information of
an endomorphism. Computing the full endomorphism ring of a supersingular elliptic curve is …
an endomorphism. Computing the full endomorphism ring of a supersingular elliptic curve is …