[图书][B] Mathematics of public key cryptography
SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …
applications, such as digital signatures. A strong background in the mathematics underlying …
Constructing elliptic curve isogenies in quantum subexponential time
Given two ordinary elliptic curves over a finite field having the same cardinality and
endomorphism ring, it is known that the curves admit a nonzero isogeny between them, but …
endomorphism ring, it is known that the curves admit a nonzero isogeny between them, but …
Mathematics of isogeny based cryptography
L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …
Towards practical key exchange from ordinary isogeny graphs
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev–
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …
Orienting supersingular isogeny graphs
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of
the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs. As an …
the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs. As an …
Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves
D Moody, D Shumow - Mathematics of Computation, 2016 - ams.org
Isogenies are the morphisms between elliptic curves and are, accordingly, a topic of interest
in the subject. As such, they have been well studied, and have been used in several …
in the subject. As such, they have been well studied, and have been used in several …
Isogeny problems with level structure
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
believed to be a difficult problem—upon which rests the security of nearly any isogeny …
Modular polynomials via isogeny volcanoes
R Bröker, K Lauter, A Sutherland - Mathematics of Computation, 2012 - ams.org
We present a new algorithm to compute the classical modular polynomial $\Phi _l $ in the
rings $\mathbf {Z}[X, Y] $ and $(\mathbf {Z}/m\mathbf {Z})[X, Y] $, for a prime $ l $ and any …
rings $\mathbf {Z}[X, Y] $ and $(\mathbf {Z}/m\mathbf {Z})[X, Y] $, for a prime $ l $ and any …
Computing Hilbert class polynomials with the Chinese remainder theorem
A Sutherland - Mathematics of Computation, 2011 - ams.org
We present a space-efficient algorithm to compute the Hilbert class polynomial $ H_D (X) $
modulo a positive integer $ P $, based on an explicit form of the Chinese Remainder …
modulo a positive integer $ P $, based on an explicit form of the Chinese Remainder …
Fast algorithms for computing isogenies between elliptic curves
We survey algorithms for computing isogenies between elliptic curves defined over a field of
characteristic either 0 or a large prime. We introduce a new algorithm that computes an …
characteristic either 0 or a large prime. We introduce a new algorithm that computes an …