Introduction to Isogeny Cryptography
Last updated
Last updated
Making this section as a motivation to make sure this is part of the book. Something to work towards.
Describe that there is a drive towards post-quantum algorithms
The incredible fact that paths within isogeny graphs commute (with the help of torsion points)
Supersingular isogeny graphs are regular Ramanujan graphs
Using paths through these graphs has spawned a whole bunch of protocols
SIKE / BIKE / ...
Hashes
...
First we will look at the fundementals that allow these protocols to be expected as good candidates for post-quantum
Then we look at these protocols in more detail. Hopefully with SageMath implementations for each
Introduction by Craig Costello
Mathematics of Isogeny Based Cryptography by Luca De Feo
The Arithmetic of Elliptic Curves by Joseph H. Silverman