Optimized CSIDH Implementation Using a 2-Torsion Point

The implementation of isogeny-based cryptography mainly use Montgomery curves, as they offer fast elliptic curve arithmetic and isogeny computation. However, although Montgomery curves have efficient 3- and 4-isogeny formula, it becomes inefficient when recovering the coefficient of the image curve...

Full description

Bibliographic Details
Main Authors: Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
Format: Article
Language:English
Published: MDPI AG 2020-07-01
Series:Cryptography
Subjects:
Online Access:https://www.mdpi.com/2410-387X/4/3/20