Faster proofs and VRFs from isogenies
S Levin, R Pedersen - Cryptology ePrint Archive, 2024 - eprint.iacr.org
We improve recent generic proof systems for isogeny knowledge by Cong, Lai, Levin [26]
based on circuit satisfiability, by using radical isogeny descriptions [19, 20] to prove a path in …
based on circuit satisfiability, by using radical isogeny descriptions [19, 20] to prove a path in …
Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3
We provide explicit descriptions for radical 2-isogenies in dimensions one, two and three
using theta coordinates. These formulas allow us to efficiently navigate in the corresponding …
using theta coordinates. These formulas allow us to efficiently navigate in the corresponding …
The design, concrete security and efficiency of isogeny-based cryptography
M Corte-Real Santos - 2024 - discovery.ucl.ac.uk
The security of most public-key cryptosystems that are currently deployed rely on the
hardness of the discrete logarithm problem or of the integer factorisation problem. In 1994 …
hardness of the discrete logarithm problem or of the integer factorisation problem. In 1994 …