No CrossRef data available.
Article contents
ISOGENIES OF ABELIAN VARIETIES IN CRYPTOGRAPHY
Part of:
Computational number theory
Finite fields and commutative rings (number-theoretic aspects)
Communication, information
Published online by Cambridge University Press: 16 March 2020
Abstract
An abstract is not available for this content so a preview has been provided. As you have access to this content, a full PDF is available via the ‘Save PDF’ action button.
MSC classification
- Type
- Abstracts of Australasian PhD Theses
- Information
- Copyright
- © 2020 Australian Mathematical Publishing Association Inc.
Footnotes
Thesis submitted to the University of Auckland in June 2019; degree approved 9 October 2019; supervisor Steven Galbraith.
References
Flynn, E. V. and Ti, Y. B., ‘Genus two isogeny cryptography’, in: Post-Quantum Cryptography: Proceedings of the 10th International Conference, PQCrypto 2019, Chongqing, China, 2019 Revised Selected Papers, Lecture Notes in Computer Science, 11505 (Springer, Cham, 2019), 286–306.10.1007/978-3-030-25510-7_16CrossRefGoogle Scholar
Galbraith, S. D., Petit, C., Shani, B. and Ti, Y. B., ‘On the security of supersingular isogeny cryptosystems’, in: Advances in Cryptology—ASIACRYPT 2016: Proceedings of the 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, Part I, Lecture Notes in Computer Science, 10031 (Springer, Berlin, 2016), 63–91.CrossRefGoogle Scholar
Ti, Y. B., ‘Fault attack on supersingular isogeny cryptosystems’, in: Post-Quantum Cryptography: Proceedings of the 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, 2017, Lecture Notes in Computer Science, 10346 (Springer, Cham, 2017), 107–122.CrossRefGoogle Scholar
You have
Access