Mathematics of Isogeny Based Cryptography

11/11/2017
by   Luca De Feo, et al.
0

These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thiès, Senegal. They try to provide a guide for Masters' students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means a reference text on the theory of elliptic curves, nor on cryptography; students are encouraged to complement these notes with some of the books recommended in the bibliography. The presentation is divided in three parts, roughly corresponding to the three lectures given. In an effort to keep the reader interested, each part alternates between the fundamental theory of elliptic curves, and applications in cryptography. We often prefer to have the main ideas flow smoothly, rather than having a rigorous presentation as one would have in a more classical book. The reader will excuse us for the inaccuracies and the omissions.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/27/2023

On the Discrete Logarithm Problem for elliptic curves over local fields

The Discrete Logarithm Problem (DLP) for elliptic curves has been extens...
research
04/07/2023

Code-based Cryptography: Lecture Notes

These lecture notes have been written for courses given at École normale...
research
08/13/2020

An Elementary Linear-Algebraic Proof without Heavy Computation for the Group Law on Elliptic Curves

The group structure on the rational points of elliptic curves plays seve...
research
03/25/2020

Parallel Computation of Optimal Ate Cryptographic Pairings at the 128, 192 and 256-bit security levels using elliptic net algorithm

Efficient computations of pairings with Miller Algorithm have recently r...
research
04/25/2022

An overview of the Eight International Olympiad in Cryptography "Non-Stop University CRYPTO"

Non-Stop University CRYPTO is the International Olympiad in Cryptography...
research
07/22/2020

Set It and Forget It! Turnkey ECC for Instant Integration

Historically, Elliptic Curve Cryptography (ECC) is an active field of ap...

Please sign up or login with your details

Forgot password? Click here to reset