Affiliation:
1. National Institute of Advanced Industrial Science and Technology
Publisher
Institute of Electronics, Information and Communications Engineers (IEICE)
Subject
Applied Mathematics,Electrical and Electronic Engineering,Computer Graphics and Computer-Aided Design,Signal Processing
Reference15 articles.
1. [1] L. Adleman, K. Manders, and G. Miller, “On taking roots in finite fields,” 18th Annual Symposium on Foundations of Computer Science (sfcs 1977), pp.175-178, 1977. 10.1109/sfcs.1977.18
2. [2] A. Bessalov, L. Kovalchuk, V. Sokolov, P. Skladannyi, and T. Radivilova, “Analysis of 2-isogeny properties of generalized form Edwards curves,” Proc. Selected Papers on Cybersecurity Providing in Information and Telecommunication Systems (CPITS 2020), Kyiv, Ukraine, July 2020 (online), V. Buriachok, D. Ageyev, V. Lahno, and V. Sokolov, eds., volume 2746 of CEUR Workshop Proceedings, pp.1-13, CEUR-WS.org, 2020.
3. [3] W. Castryck, T. Decru, and F. Vercauteren, “Radical isogenies,” Advances in Cryptology-ASIACRYPT 2020-26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, Dec. 2020, Proceedings, Part II, S. Moriai and H. Wang, eds., volume 12492 of Lecture Notes in Computer Science, pp.493-519, Springer, 2020. 10.1007/978-3-030-64834-3_17
4. [4] D.X. Charles, K.E. Lauter, and E.Z. Goren, “Cryptographic hash functions from expander graphs,” J. Cryptol., vol.22, no.1, pp.93-113, 2009. 10.1007/s00145-007-9002-x
5. [5] L.D. Feo, D. Jao, and J. Plût, “Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies,” J. Math. Cryptol., vol.8, no.3, pp.209-247, 2014. 10.1515/jmc-2012-0015