SQIsign2D-East: A new signature scheme using 2-dimensional isogenies
Isogeny-based cryptography is cryptographic schemes whose security is based on the
hardness of a mathematical problem called the isogeny problem, and is attracting attention …
hardness of a mathematical problem called the isogeny problem, and is attracting attention …
An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between
products of elliptic curves in the theta model. The description of the algorithm is split into …
products of elliptic curves in the theta model. The description of the algorithm is split into …
Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign
The Deuring correspondence is a correspondence between supersingular elliptic curves
and quaternion orders. Under this correspondence, an isogeny between elliptic curves …
and quaternion orders. Under this correspondence, an isogeny between elliptic curves …
On random sampling of supersingular elliptic curves
We consider the problem of sampling random supersingular elliptic curves over finite fields
of cryptographic size (SRS problem). The currently best-known method combines the …
of cryptographic size (SRS problem). The currently best-known method combines the …
Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4
MA Aardal, G Adj, A Alblooshi, DF Aranha… - IACR Transactions on …, 2025 - tosc.iacr.org
SQIsign is a well-known post-quantum signature scheme due to its small combined
signature and public-key size. However, SQIsign suffers from notably long signing times …
signature and public-key size. However, SQIsign suffers from notably long signing times …
Computing modular polynomials by deformation
We present an unconditional CRT algorithm to compute the modular polynomial\(\Phi _\ell
(X, Y)\) in quasi-linear time. The main ingredients of our algorithm are: the embedding …
(X, Y)\) in quasi-linear time. The main ingredients of our algorithm are: the embedding …
Breaking and repairing SQIsign2D-East
We present a key recovery attack on SQIsign2D-East that reduces its security level from
$\lambda $ to $\lambda/2$. We exploit the fact that each signature leaks a Legendre symbol …
$\lambda $ to $\lambda/2$. We exploit the fact that each signature leaks a Legendre symbol …
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
M Duparc, TB Fouotsa - International Conference on the Theory and …, 2024 - Springer
We introduce SQIPrime, a post-quantum digital signature scheme based on the Deuring
correspondence and Kani's Lemma. Compared to its predecessors that are SQISign and …
correspondence and Kani's Lemma. Compared to its predecessors that are SQISign and …
Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies
We construct two efficient post-quantum ring signatures with anonymity against full key
exposure from isogenies, addressing the limitations of existing isogeny-based ring …
exposure from isogenies, addressing the limitations of existing isogeny-based ring …
Isogeny interpolation and the computation of isogenies from higher dimensional representations
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) scheme is a public key
cryptosystem that was submitted to the National Institute of Standards and Technology's …
cryptosystem that was submitted to the National Institute of Standards and Technology's …