Skip to search formSkip to main contentSkip to account menu>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Review

2019

Review

2019

This is an informal tutorial on the supersingular isogeny Diffie-Hellman protocol aimed at non-isogenists.

2019

2019

We describe the structure of Tate-Shafarevich groups of a constant elliptic curves over function fields by exploiting the volcano… Expand

Highly Cited

2016

Highly Cited

2016

We study cryptosystems based on supersingular isogenies. This is an active area of research in post-quantum cryptography. Our… Expand

2013

2013

Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are l-isogenies. Algorithms allowing to travel on… Expand

Highly Cited

2012

Highly Cited

2012

We present a new algorithm to compute the classical modular polynomial l in the rings Z(X;Y ) and (Z=mZ)(X;Y ), for a prime l and… Expand

2012

2012

The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them… Expand

2010

2010

Isogeny volcanoes are graphs whose vertices are elliptic curves and whose edges are l-isogenies. Algorithms allowing to travel on… Expand

2010

2010

Alberta Number Theory Days fell at the very start of the newly formed PIMS CRG in Number Theory, and was thus an excellent… Expand

2007

2007

The security of most elliptic curve cryptosystems is based on the intractability of the Elliptic Curve Discrete Logarithm Problem… Expand

Highly Cited

2002

Highly Cited

2002

Recently, Kohel gave algorithms to compute the conductor of the endomorphism ring of an ordinary elliptic curve, given the… Expand