SQIsign2D-East: A new signature scheme using 2-dimensional isogenies

K Nakagawa, H Onuki, W Castryck, M Chen… - … Conference on the …, 2024 - Springer
Isogeny-based cryptography is cryptographic schemes whose security is based on the
hardness of a mathematical problem called the isogeny problem, and is attracting attention …

An algorithmic approach to (2, 2)-isogenies in the theta model and applications to isogeny-based cryptography

P Dartois, L Maino, G Pope, D Robert - … on the Theory and Application of …, 2024 - Springer
In this paper, we describe an algorithm to compute chains of (2, 2)-isogenies between
products of elliptic curves in the theta model. The description of the algorithm is split into …

Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign

H Onuki, K Nakagawa - International Conference on the Theory and …, 2024 - Springer
The Deuring correspondence is a correspondence between supersingular elliptic curves
and quaternion orders. Under this correspondence, an isogeny between elliptic curves …

On random sampling of supersingular elliptic curves

M Mula, N Murru, F Pintore - Annali di Matematica Pura ed Applicata (1923 …, 2024 - Springer
We consider the problem of sampling random supersingular elliptic curves over finite fields
of cryptographic size (SRS problem). The currently best-known method combines the …

Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4

MA Aardal, G Adj, A Alblooshi, DF Aranha… - IACR Transactions on …, 2025 - tosc.iacr.org
SQIsign is a well-known post-quantum signature scheme due to its small combined
signature and public-key size. However, SQIsign suffers from notably long signing times …

Computing modular polynomials by deformation

S Kunzweiler, D Robert - Research in Number Theory, 2025 - Springer
We present an unconditional CRT algorithm to compute the modular polynomial\(\Phi _\ell
(X, Y)\) in quasi-linear time. The main ingredients of our algorithm are: the embedding …

Breaking and repairing SQIsign2D-East

W Castryck, M Chen, R Invernizzi, G Lorenzon… - Cryptology ePrint …, 2024 - eprint.iacr.org
We present a key recovery attack on SQIsign2D-East that reduces its security level from
$\lambda $ to $\lambda/2$. We exploit the fact that each signature leaks a Legendre symbol …

SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies

M Duparc, TB Fouotsa - International Conference on the Theory and …, 2024 - Springer
We introduce SQIPrime, a post-quantum digital signature scheme based on the Deuring
correspondence and Kani's Lemma. Compared to its predecessors that are SQISign and …

Erebor and Durian: Full Anonymous Ring Signatures from Quaternions and Isogenies

G Borin, YF Lai, A Leroux - IACR Communications in Cryptology, 2024 - hal.science
We construct two efficient post-quantum ring signatures with anonymity against full key
exposure from isogenies, addressing the limitations of existing isogeny-based ring …

Isogeny interpolation and the computation of isogenies from higher dimensional representations

D Jao, J Laflamme - International Conference on Cryptology in India, 2024 - Springer
Abstract The Supersingular Isogeny Diffie-Hellman (SIDH) scheme is a public key
cryptosystem that was submitted to the National Institute of Standards and Technology's …