[图书][B] Mathematics of public key cryptography

SD Galbraith - 2012 - books.google.com
Public key cryptography is a major interdisciplinary subject with many real-world
applications, such as digital signatures. A strong background in the mathematics underlying …

Constructing elliptic curve isogenies in quantum subexponential time

A Childs, D Jao, V Soukharev - Journal of Mathematical Cryptology, 2014 - degruyter.com
Given two ordinary elliptic curves over a finite field having the same cardinality and
endomorphism ring, it is known that the curves admit a nonzero isogeny between them, but …

Mathematics of isogeny based cryptography

L De Feo - arXiv preprint arXiv:1711.04062, 2017 - arxiv.org
These lectures notes were written for a summer school on Mathematics for post-quantum
cryptography in Thi\es, Senegal. They try to provide a guide for Masters' students to get …

Towards practical key exchange from ordinary isogeny graphs

L De Feo, J Kieffer, B Smith - … 2018: 24th International Conference on the …, 2018 - Springer
We revisit the ordinary isogeny-graph based cryptosystems of Couveignes and Rostovtsev–
Stolbunov, long dismissed as impractical. We give algorithmic improvements that accelerate …

Orienting supersingular isogeny graphs

L Colo, D Kohel - Journal of Mathematical Cryptology, 2020 - degruyter.com
We introduce a category of 𝓞-oriented supersingular elliptic curves and derive properties of
the associated oriented and nonoriented ℓ-isogeny supersingular isogeny graphs. As an …

Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves

D Moody, D Shumow - Mathematics of Computation, 2016 - ams.org
Isogenies are the morphisms between elliptic curves and are, accordingly, a topic of interest
in the subject. As such, they have been well studied, and have been used in several …

Isogeny problems with level structure

L De Feo, TB Fouotsa, L Panny - … on the Theory and Applications of …, 2024 - Springer
Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is
believed to be a difficult problem—upon which rests the security of nearly any isogeny …

Modular polynomials via isogeny volcanoes

R Bröker, K Lauter, A Sutherland - Mathematics of Computation, 2012 - ams.org
We present a new algorithm to compute the classical modular polynomial $\Phi _l $ in the
rings $\mathbf {Z}[X, Y] $ and $(\mathbf {Z}/m\mathbf {Z})[X, Y] $, for a prime $ l $ and any …

Computing Hilbert class polynomials with the Chinese remainder theorem

A Sutherland - Mathematics of Computation, 2011 - ams.org
We present a space-efficient algorithm to compute the Hilbert class polynomial $ H_D (X) $
modulo a positive integer $ P $, based on an explicit form of the Chinese Remainder …

Fast algorithms for computing isogenies between elliptic curves

A Bostan, F Morain, B Salvy, É Schost - Mathematics of Computation, 2008 - ams.org
We survey algorithms for computing isogenies between elliptic curves defined over a field of
characteristic either 0 or a large prime. We introduce a new algorithm that computes an …