arrow-left

All pages
gitbookPowered by GitBook
1 of 1

Loading...

Introduction to Isogeny Cryptography

Making this section as a motivation to make sure this is part of the book. Something to work towards.

hashtag
Page Plan

  • Describe that there is a drive towards post-quantum algorithms

  • The incredible fact that paths within isogeny graphs commute (with the help of torsion points)

  • Supersingular isogeny graphs are regular Ramanujan graphs

  • Using paths through these graphs has spawned a whole bunch of protocols

    • SIKE / BIKE / ...

    • Hashes

  • First we will look at the fundementals that allow these protocols to be expected as good candidates for post-quantum

  • Then we look at these protocols in more detail. Hopefully with SageMath implementations for each

hashtag
References I plan to use

  • Introduction by Craig Costello

  • Mathematics of Isogeny Based Cryptography by Luca De Feo

...

-

  • The Arithmetic of Elliptic Curves by Joseph H. Silverman

  • â„“\ellâ„“
    (â„“+1)(\ell + 1)(â„“+1)
    https://eprint.iacr.org/2019/1321.pdfarrow-up-right
    https://arxiv.org/pdf/1711.04062.pdfarrow-up-right
    https://www.springer.com/gp/book/9780387094939arrow-up-right