Computing supersingular endomorphism rings using inseparable endomorphisms

J Fuselier, A Iezzi, M Kozek, T Morrison, C Namoijam - Journal of Algebra, 2025 - Elsevier
We give an algorithm for computing an inseparable endomorphism of a supersingular
elliptic curve E defined over F p 2, which, conditional on GRH, runs in expected O (p 1/2 …

Finding Practical Parameters for Isogeny-based Cryptography

MCR Santos, JK Eriksen, M Meyer… - Cryptology ePrint …, 2024 - eprint.iacr.org
Isogeny-based schemes often come with special requirements on the field of definition of the
involved elliptic curves. For instance, the efficiency of SQIsign, a promising candidate in the …

PEARL-SCALLOP: Parameter Extension Applicable in Real Life for SCALLOP

B Allombert, JF Biasse, JK Eriksen, P Kutas… - 2024 - inria.hal.science
A crucial ingredient for many cryptographic primitives such as key exchange protocols and
advanced signature schemes is a commutative group action where the structure of the …

Isogeny-based Cryptography using Isomorphisms of Superspecial Abelian Surfaces

P Gaudry, J Soumier, PJ Spaenlehauer - Cryptology ePrint Archive, 2025 - eprint.iacr.org
We investigate the algorithmic problem of computing isomorphisms between products of
supersingular elliptic curves, given their endomorphism rings. This computational problem …

The design, concrete security and efficiency of isogeny-based cryptography

M Corte-Real Santos - 2024 - discovery.ucl.ac.uk
The security of most public-key cryptosystems that are currently deployed rely on the
hardness of the discrete logarithm problem or of the integer factorisation problem. In 1994 …

Isogenies and cryptography

J Sotáková - 2024 - eprints.illc.uva.nl
I come from a generation that grew up with the smartphone. The small gadget has been in
my hand for almost 20 years, and has been my primary source of communication with the …