Computing -isogenies between Kummer lines

D Robert, N Sarkis - IACR Communications in Cryptology, 2024 - hal.science
We use theta groups to study $2 $-isogenies between Kummer lines, with a particular focus
on the Montgomery model. This allows us to recover known formula, along with more …

Fast 4 way vectorized ladder for the complete set of montgomery curves

H Hışıl, B Eğrice, M Yassı - International Journal of Information …, 2022 - dergipark.org.tr
This paper introduces 4 way vectorization of Montgomery ladder on any Montgomery form
elliptic curve. Our algorithm takes 2M^ 4+ 1S^ 4 (M^ 4: A vector of four field multiplications …

The generalized montgomery coordinate: A new computational tool for isogeny-based cryptography

T Moriya, H Onuki, Y Aikawa, T Takagi - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Recently, some studies have constructed one-coordinate arithmetics on elliptic curves. For
example, formulas of the $ x $-coordinate of Montgomery curves, $ x $-coordinate of …

An Empirical Study to Demonstrate that EdDSA can be used as a Performance Improvement Alternative to ECDSA in Blockchain and IoT

J Guruprakash, S Koppu - Informatica, 2022 - informatica.si
Digital signatures are a vital part of the digital world. The trust factor in the digital world is
ensured with a digital signature. Over the evolution, the purpose remained constant, but the …

Revolutionizing signature scheme: the enhanced Edward Elgamal extreme performance accumulate signature approach for IoT and blockchain applications

R Anusha, R Saravanan - Soft Computing, 2025 - Springer
Digital signatures, essential for establishing trust in the digital realm, have evolved in their
application and importance alongside emerging technologies such as the Internet of Things …

Isogeny computation on Kummer lines and applications

C Chen, F Zhang, C Zhao - Journal of Information Security and Applications, 2023 - Elsevier
Isogeny-based cryptography has been the hotspot in recent years owing to its resistance to
quantum computing attacks. Unfortunately, efficiency is the main bottleneck that limits its …

Simplified isogeny formulas on twisted Jacobi quartic curves

Z Hu, Z Liu, L Wang, Z Zhou - Finite Fields and Their Applications, 2022 - Elsevier
Isogenies between elliptic curves play a very important role in elliptic curve related
cryptosystems and cryptanalysis. It is widely known that different models of elliptic curves …

On the Efficient Representation of Isogenies: A Survey for NuTMiC 2024

D Robert - … Conference on Number-Theoretic Methods in …, 2024 - Springer
On the Efficient Representation of Isogenies | SpringerLink Skip to main content Advertisement
Springer Nature Link Account Menu Find a journal Publish with us Track your research …

Kummer for genus one over prime order fields

S Karati, P Sarkar - Advances in Cryptology–ASIACRYPT 2017: 23rd …, 2017 - Springer
This work considers the problem of fast and secure scalar multiplication using curves of
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz in 2009 …

Kummer for genus one over prime-order fields

S Karati, P Sarkar - Journal of Cryptology, 2020 - Springer
This work considers the problem of fast and secure scalar multiplication using curves of
genus one defined over a field of prime order. Previous work by Gaudry and Lubicz (Finite …