# Supersingular isogeny key exchange

## Papers overview

Semantic Scholar uses AI to extract papers important to this topic.

2019

2019

- 2019

We describe the structure of Tate-Shafarevich groups of a constant elliptic curves over function fields by exploiting the volcano… (More)

Is this relevant?

2018

2018

- 2018

Public-key cryptography in use today can be broken by a quantum computer with sufficient resources. Microsoft Research has… (More)

Is this relevant?

2016

2016

- IACR Cryptology ePrint Archive
- 2016

We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our… (More)

Is this relevant?

Review

2015

Review

2015

- 2015

In this report we review four post-quantum cryptosystems: the ring learning with errors key exchange, the supersingular isogeny… (More)

Is this relevant?

2012

2012

- Math. Comput.
- 2012

Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are l-isogenies. Algorithms allowing to travel on… (More)

Is this relevant?

2011

2011

- Math. Comput.
- 2011

We present a new algorithm to compute the classical modular polynomial l in the rings Z(X;Y ) and (Z=mZ)(X;Y ), for a prime l and… (More)

Is this relevant?

2010

2010

- ANTS
- 2010

Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are $\ell$-isogenies. Algorithms allowing to… (More)

Is this relevant?

2008

2008

- WISA
- 2008

The usage of elliptic curve cryptography in smart cards has been shown to be efficient although, when considering curves, one… (More)

Is this relevant?

2007

2007

- ACSW
- 2007

The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem… (More)

Is this relevant?

Highly Cited

2002

Highly Cited

2002

- ANTS
- 2002

Recently, Kohel gave algorithms to compute the conductor of the endomorphism ring of an ordinary elliptic curve, given the… (More)

Is this relevant?