Table of contents

  • This session has been presented April 03, 2020.

Description

  • Speaker

    Antonin Leroux - LIX

The correspondence between maximal orders in a quaternion algebra and supersingular elliptic curves has uncovered new perspectives in the field of isogeny-based cryptography. The KLPT algorithm of Kohel et al. in 2014 introduces an algorithm solving the quaternion isogeny path problem in polynomial time. Studying this problem has applications both constructive and destructive. It has allowed to reduce the problem of computing isogenies between two curves to the one of endomorphism ring computation. The GPS signature scheme from Galbraith et al. in 2017 was built on this algorithm.<br/> The main algorithm of KLPT solves the problem when the maximal order is special extremal. The paper also proposes a generalized version, but it produces an output with some very characteristic property that prevent from using it in some applications, like a generalization of the GPS signature. In this work, we propose a new method to generalize the algorithm. It produces a shorter solution with the same time complexity and without the problematic property.<br/> lien: https://e-learning.sviesolutions.com/pffi7slpuumw

Next sessions

  • Séminaire C2 à INRIA Paris

    • January 16, 2026 (10:00 - 17:00)

    • INRIA Paris

    Emmanuel Thomé et Pierrick Gaudry Rachelle Heim Boissier Épiphane Nouetowa Dung Bui Plus d'infos sur https://seminaire-c2.inria.fr/ 
  • Attacking the Supersingular Isogeny Problem: From the Delfs–Galbraith algorithm to oriented graphs

    • January 23, 2026 (13:45 - 14:45)

    • IRMAR - Université de Rennes - Campus Beaulieu Bat. 22, RDC, Rennes - Amphi Lebesgue

    Speaker : Arthur Herlédan Le Merdy - COSIC, KU Leuven

    The threat of quantum computers motivates the introduction of new hard problems for cryptography.One promising candidate is the Isogeny problem: given two elliptic curves, compute a “nice’’ map between them, called an isogeny.In this talk, we study classical attacks on this problem, specialised to supersingular elliptic curves, on which the security of current isogeny-based cryptography relies. In[…]
    • Cryptography

Show previous sessions