Isogeny graphs, algorithms and applications

Size: px
Start display at page:

Download "Isogeny graphs, algorithms and applications"

Transcription

1 Isogeny graphs, algorithms and applications University of Auckland, New Zealand Reporting on joint work with Christina Delfs (Oldenburg). Thanks: David Kohel, Drew Sutherland, Marco Streng.

2 Plan Elliptic curves and isogenies Isogeny graphs and applications Ordinary case Supersingular case New work with Christina Delfs: improved algorithms for computing isogenies between supersingular elliptic curves. Please ask questions at any time.

3 Isogenies An elliptic curve over a eld k is a non-singular projective cubic curve. The set of k-rational points is a group. An isogeny φ : E 1 E 2 of elliptic curves is a morphism that is a group homomorphism. Examples of isogenies include: [n] : E E and Frobenius map when k is a nite eld. An isogeny has nite kernel G E 1 (k). If the isogeny is separable then #G = deg(φ). Tate's isogeny theorem: Let E 1, E 2 be elliptic curves over a nite eld F q. Then #E 1 (F q ) = #E 2 (F q ) i there is an isogeny φ : E 1 E 2 over F q.

4 Isogenies Given a nite subgroup G E 1 (k) there exists an elliptic curve E 2 and a separable isogeny φ : E 1 E 2 with ker(φ) = G. The pair (E 2, φ) can be computed using Vélu's formulae. Two isogenies φ : E 1 E 2 and φ : E 1 E 2 are equivalent if they have the same kernel. Let l be prime. Let E 1 be an elliptic curve. Then over k there are l + 1 non-equivalent isogenies of degree l from E 1. There exists an isogeny φ : E 1 E 2 dened over k of degree n if and only if Φ n (j(e 1 ), j(e 2 )) = 0 where Φ n is the n-th modular polynomial. Conversely, each root of Φ n (j(e 1 ), y) in k determines an equivalence class of isogenies of degree n. An isogeny of degree n over k can be factored as a composition of isogenies over k of prime degree.

5 If you want to learn more about isogenies...

6 Applications of isogenies Schoof-Elkies-Atkin (Lercier, Couveignes) point-counting algorithm. Kohel's thesis (computing End(E) using volcanos). Relating the discrete logarithm problem on elliptic curves with the same number of points (Galbraith, Jao-Miller-Venkatesan). Charles-Goren-Lauter hash function. Stolbunov cryptosystem. Jao-de-Feo cryptosystem. Computing class polynomials and modular polynomials (Sutherland). There is also interesting work in genus 2 that I do not discuss in this talk.

7 Isogeny graph X (k, E, L) Let k be a eld of characteristic p, E an elliptic curve over k, and L a set of small primes l p. The vertices of the isogeny graph are k-isomorphism classes of elliptic curves k-isogenous to E. Usually we label the vertices with j-invariants. The edges are l-isogenies from φ : E 1 E 2 over k, for some l L, for elliptic curves E 1, E 2 in the vertex set. The graph can be constructed using modular polynomials or Vélu's formulae.

8 Isogeny graphs An elliptic curve E over F p n is supersingular if E[p] = {0} (equiv End(E) non-commutative). Otherwise it is called ordinary. When E/F p is supersingular then X (F p, E, {l}) is connected for any prime l p. We omit the mention of E in the supersingular case. The supersingular graph has around p/12 vertices. The ordinary isogeny graph for an elliptic curve over F q has O( q) vertices. When E is supersingular, or when E is ordinary and L is big enough (in particular, so the graph is connected), then the isogeny graph is an expander graph.

9 Example 0 α ᾱ 2 68 Supersingular Isogeny Graph X (F 83, {2})

10 Example 0 3 α ᾱ Supersingular Isogeny Graph X (F 101, {2})

11 Charles-Goren-Lauter hash function Consider the supersingular graph X (F p, {2}). Fix a pair of initial vertices j 1 and j 0. Given an input string of bits b 1 b 2 one computes a non-backtracking path through the graph by choosing at each stage one of the two neighbours that does not go back to the previous j-invariant. In other words, compute the two roots of Φ 2 (j i, y)/(y j i 1), order them, and use the current bit b i to deterministically choose the next step in the walk. The hash value is the nal j-invariant. Finding a collision in the hash function is equivalent to nding a non-trivial cycle in the isogeny graph. Inverting the hash function is nding a path in the graph between two given vertices.

12 Computational Problems and Algorithms in Graph Theory Find a path between two vertices (= nd an isogeny between two given elliptic curves). Find a non-trivial cycle in the graph. Dijsktra algorithm. Pohl's bi-directional search (details on following slide).

13 Local view only

14 Pohl bi-directional search Start with two vertices. Grow trees outwards from each vertex (breadth-rst search) and store every vertex. When there is a vertex visited by both trees then get a path. By the birthday paradox, expect a match after around πn trials, where N is the size of the graph. Storage and running time therefore O( N) eld elements/operations. The use of this algorithm for the isogeny problem was detailed in a 1999 paper of mine. Would prefer an algorithm that requires low storage and can be distributed.

15 Ordinary case: CM Theory (briey) Let E/F q be ordinary, so #E(F q ) = q + 1 t for some non-zero t. Let π q be the q-power Frobenius: π 2 q tπ q + q = 0. Let d = t 2 4q < 0 and K = Q( d). Then Z[π q ] End(E) O K. An isomorphism class E of elliptic curves in the isogeny class of E corresponds to an ideal class of some order O such that Z[π q ] O O K. Further, isogenies out of E correspond to invertible O-modules. The isogeny graph is equal to a graph of ideal classes. The graph has a regular structure.

16 Volcanoes Kohel: Let E 1, E 2 be ordinary elliptic curves over F q and let [End(E 1 ) : End(E 2 )] = l. Then every isogeny φ : E 1 E 2 has degree divisible by l. The structure of orders Z[ d] O O K is reected in the isogeny graph and there is a notion of level. One can detect when one is on the oor, at which point one can climb to the crater.

17 Ordinary case: CM Theory We consider the graph X (F q, E, L) of F q -isomorphism classes of elliptic curves over F q isogenous to E, and L is a set of primes that split or ramify in Q( d). Computations in class groups are easy. There is a compact representation for ideal classes. One can compute the structure of the ideal class group in subexponential time. See very recent article by Franz Lemmermeyer in LMS JCM about Václav imerka for some interesting history about index calculus algorithms in ideal class groups.

18 Ordinary case Galbraith-Hess-Smart gave a low-storage and distributed algorithm for the ordinary isogeny problem. Idea is to use Pollard-style random walks in the graph. Isogenies correspond to ideals (a, b + d) in imaginary quadratic elds, so can represent an isogeny compactly as the pair (a, b) of integers. Designate distinguished points in the graph. Clients run deterministic pseudorandom walks (like used in Pollard rho) from randomised initial vertices. When walk hits a distinguished point then the data is sent to the server. When the server receives the same distinguished point but from walks starting from dierent initial vertices then the path is found.

19 Ordinary case As with any Pollard-type method it is necessary to handle short cycles in the walk. There is a method to smooth a long path in the graph into a shorter path, using ideas from subexponential algorithms for ideal class groups. By making distinguished points common enough one can also ensure that paths are relatively short, but the storage requirements become large. Algorithm improved greatly by Anton Stolbunov in his PhD thesis. A full discussion is given in a joint paper by Stolbunov and me.

20 Supersingular case In principle could also use Pollard-style pseudorandom walks to solve the supersingular isogeny problem in X (F p, {2}). Problem is that there are only 3 directions from each point, so the probability of falling into a short cycle is high. Can minimise this by using more primes, but then we are not solving the problem in the original graph. It also seems to be non-trivial to compactly represent the isogeny or to shorten a long isogeny. Hence, implementing the algorithm is irksome.

21 Question: What about the supersingular isogeny problem restricted to curves over F p? The number of supersingular elliptic curves in F p is approximately p/12, but there are only O( p) supersingular elliptic curves over F p. So nding a path between two supersingular elliptic curves over F p should be easier than the general problem.

22 Full supersingular isogeny graph 0 α ᾱ 2 68 Supersingular Isogeny Graph X (F 83, 2)

23 Subgraph Subgraph consisting j F 83

24 Not quite a subgraph Recall that X (F p, L) is a graph whose vertices are F p -isomorphism classes of elliptic curves. In turns out to be better to consider not the subgraph of F p -isomorphism classes of curves over F p, but the graph of F p -isomorphism classes of curves over F p. If E/F p is a supersingular elliptic curve and p > 3 then #E(F p ) = p + 1 and any quadratic twist of E also has p + 1 points. Hence, in general each j(e) F p appears twice in the graph. In the ordinary case the quadratic twists belong to a distinct but isomorphic graph.

25 Not quite a subgraph Since a vertex is no longer determined uniquely by its j-invariant we need to be more careful to construct the graph. For example, use Vélu. It also turns out to be better to consider not all isogenies over F p, but only isogenies over F p. In small examples this means missing some edges between curves over F p, but in larger graphs the isogenies not over F p are usually to curves not over F p.

26 Subgraph X (F 83, 2) F 83

27 New graph X (F 83, 2)

28 Structure Let E be a supersingular elliptic curve over F p, where p > 3. End(E) is a maximal order in a quaternion algebra, but forget about that. Frobenius π p End Fp (E) satises π 2 p + p = 0. Hence Z[ p] End Fp (E) is an order in K = Q( p). If p 1 (mod 4) then O K = Z[ p], while if p 3 (mod 4) then there are two possible orders, O K = Z[(1 + p)/2] and O 2 = Z[ p]. By Deuring lifting, E corresponds to an ideal class for O K or O 2. Further, F p -rational isogenies of degree l out of E correspond to invertible O-modules corresponding to the splitting of the prime l.

29 Structure theorem (p > 3 prime) 1. p 1 (mod 4): There are h( 4p) F p -isomorphism classes of supersingular elliptic curves over F p, all having the same endomorphism ring Z[ p]. From every one there is one outgoing F p -rational horizontal 2-isogeny as well as two horizontal l-isogenies for every prime l > 2 with ( ) p l = p 3 (mod 4): There are two levels in the supersingular isogeny graph. From each vertex there are two horizontal l-isogenies for every prime l > 2 with ( ) p = 1. l 2.1 If p 7 (mod 8), on each level h( p) vertices are situated. Surface and oor are connected 1:1 with 2-isogenies and on the surface we also have two horizontal 2-isogenies from each vertex. 2.2 If p 3 (mod 8), we have h( p) vertices on the surface and 3h( p) on the oor. Surface and oor are connected 1:3 with 2-isogenies, and there are no horizontal 2-isogenies.

30 Example 1: p = (mod 4) Supersingular Isogeny Graph X (F 101, 2)

31 New X (F 101, 2)

32 Example 2: p = (mod 8) α ᾱ β β Supersingular Isogeny Graph X (F 103, 2)

33 New X (F 103, 2)

34 Algorithmic applications To ensure the graph is connected we need to use a set of primes L such that the ideals above l L generate the ideal class group. One can use the 2-isogeny volcano structure to reduce to the case of the maximal order. One can perform the Galbraith-Hess-Smart algorithm verbatim to nd an isogeny between two supersingular curves with j-invariants in F p. This algorithm is easily distributed, and the techniques of Stolbunov can be employed. This also leads to an improved algorithm for the general supersingular isogeny problem. In practice one goes back to F p -isomorphism classes.

35 Bibliography S. D. Galbraith, Constructing isogenies between elliptic curves over nite elds, London Math. Soc., Journal of Computational Mathematics, Vol. 2 (1999) S. D. Galbraith, F. Hess, N. P. Smart, Extending the GHS Weil descent attack, EUROCRYPT 2002, Springer LNCS 2332 (2002) S. D. Galbraith and A. Stolbunov, Improved algorithm for the isogeny problem for ordinary elliptic curves, Applicable Algebra in Engineering, Communication and Computing, Vol. 24, No. 2 (2013) C. Delfs and S. D. Galbraith, Computing Isogenies between Supersingular Elliptic Curves over F p (preprint).

36 Challenges Random walks lead to long chains of isogenies: How to get short ones? How to convert isogeny chains to new chains comprising isogenies of dierent degrees (e.g., convert to chains of 2-isogenies)? Can you smell the subgraph of supersingular j-invariants in F p? (e.g., Ionica-Joux) Eciently compute End(E) for all curves in the graph. Give an ecient algorithm that, given a maximal order O in the quaternion algebra ramied only at and p, constructs an elliptic curve E/F p such that End(E) = O. See I. Chevyrev and S. D. Galbraith, Distinguishing Maximal Orders of Quaternion Algebras by their Short Elements, arxiv:

37 Thank You

Ecient Post-Quantum Undeniable Signature on 64-bit ARM

Ecient Post-Quantum Undeniable Signature on 64-bit ARM Ecient Post-Quantum Undeniable Signature on 64-bit ARM Amir Jalali 1 Reza Azarderakhsh 1 Mehran Mozaari-Kermani 2 Department of Computer and Electrical Engineering and Computer Science, Florida Atlantic

More information

Isogeny cordillera algorithm to obtain cryptographically good elliptic curves

Isogeny cordillera algorithm to obtain cryptographically good elliptic curves Isogeny cordillera algorithm to obtain cryptographically good elliptic curves J Miret 1 D Sadornil 2 J Tena 3 R Tomàs 1 M Valls 1 1 Dept de Matemàtica Universitat de Lleida (Spain) Email: {miret,rosana,magda}@epsudles

More information

c 2006 by CRC Press, LLC.

c 2006 by CRC Press, LLC. This is the of the Handbook of Elliptic and Hyperelliptic Curve Cryptography, Henri Cohen, Christophe Doche, and Gerhard Frey, Editors, CRC Press 2006. CRC Press has granted the following specific permissions

More information

Dale Husemoller. Elliptic Curves. Second Edition. With Appendices by Otto Forster, Ruth Lawrence, and Stefan Theisen. With 42 Illustrations.

Dale Husemoller. Elliptic Curves. Second Edition. With Appendices by Otto Forster, Ruth Lawrence, and Stefan Theisen. With 42 Illustrations. Dale Husemoller Elliptic Curves Second Edition With Appendices by Otto Forster, Ruth Lawrence, and Stefan Theisen With 42 Illustrations Springer Preface to the Second Edition Preface to the First Edition

More information

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044.

--> Buy True-PDF --> Auto-delivered in 0~10 minutes. GM/T Translated English of Chinese Standard: GM/T0044. Translated English of Chinese Standard: GM/T0044.1-2016 www.chinesestandard.net Buy True-PDF Auto-delivery. Sales@ChineseStandard.net CRYPTOGRAPHY INDUSTRY STANDARD OF THE PEOPLE S REPUBLIC OF CHINA GM

More information

Improving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves

Improving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves Improving Divisor Arithmetic Over Genus 2 Hyperelliptic Curves Sebastian Lindner Supervisor: Michael Jacobson Motivation Our goal is to make computation of divisor arithmetic in the divisor class group

More information

On the Performance of Hyperelliptic Cryptosystems

On the Performance of Hyperelliptic Cryptosystems On the Performance of Hyperelliptic Cryptosystems Nigel P. Smart Extended Enterpise Laboratory HPL-98-162 September, 1998 hyperelliptic, cryptography In this paper we discuss various aspects of cryptosystems

More information

E-th roots and static Diffie-Hellman using index calculus

E-th roots and static Diffie-Hellman using index calculus E-th roots and static Diffie-Hellman using index calculus Antoine Joux 1 Joint work with Reynald Lercier 2, David Naccache 3, Emmanuel Thomé 4 Elliptic Curve Cryptography 2008 Utrecht 1 DGA and UVSQ 2

More information

Software Implementation of Tate Pairing over GF(2 m )

Software Implementation of Tate Pairing over GF(2 m ) Software Implementation of Tate Pairing over GF(2 m ) G. Bertoni 1, L. Breveglieri 2, P. Fragneto 1, G. Pelosi 2 and L. Sportiello 1 ST Microelectronics 1, Politecnico di Milano 2 Via Olivetti, Agrate

More information

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS

A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS A SIGNATURE ALGORITHM BASED ON DLP AND COMPUTING SQUARE ROOTS Ounasser Abid 1 and Omar Khadir 2 1, 2 Laboratory of Mathematics, Cryptography and Mechanics, FSTM University Hassan II of Casablanca, Morocco

More information

Ecient Post-Quantum Undeniable Signature on 64-bit ARM

Ecient Post-Quantum Undeniable Signature on 64-bit ARM Ecient Post-Quantum Undeniable Signature on 64-bit RM mir Jalali 1, Reza zarderakhsh 1, and Mehran Mozaari-Kermani 2 1 Department of omputer and Electrical Engineering and omputer Science, Florida tlantic

More information

COUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE

COUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE COUNTING THE POINTS OF AN ELLIPTIC CURVE ON A LOW-MEMORY DEVICE Abstract. An important but very memory consuming step in elliptic curve cryptography is that of coming up with an elliptic curve where the

More information

Constructing Pairing-Friendly Elliptic Curves for Cryptography

Constructing Pairing-Friendly Elliptic Curves for Cryptography Constructing Pairing-Friendly Elliptic Curves for Cryptography University of California, Berkeley, USA 2nd KIAS-KMS Summer Workshop on Cryptography Seoul, Korea 30 June 2007 Outline 1 Recent Developments

More information

FINDING CRYPTOGRAPHICALLY STRONG ELLIPTIC CURVES: A TECHNICAL REPORT

FINDING CRYPTOGRAPHICALLY STRONG ELLIPTIC CURVES: A TECHNICAL REPORT FINDING CRYPTOGRAPHICALLY STRONG ELLIPTIC CURVES: A TECHNICAL REPORT HAMISH IVEY-LAW AND ROBERT ROLLAND Abstract. Elliptic curve cryptography is becoming the standard for public key cryptography. Unfortunately,

More information

Details and description of Application

Details and description of Application CUDA based implementation of parallelized Pollard's Rho algorithm for ECDLP M. Chinnici a, S. Cuomo b, M. Laporta c, B. Pennacchio d, A. Pizzirani e, S. Migliori f a,d ENEA- FIM-INFOPPQ, Casaccia Research

More information

TORIC VARIETIES JOAQUÍN MORAGA

TORIC VARIETIES JOAQUÍN MORAGA TORIC VARIETIES Abstract. This is a very short introduction to some concepts around toric varieties, some of the subsections are intended for more experienced algebraic geometers. To see a lot of exercises

More information

Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography

Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography Finite Field Arithmetic Using AVX-512 For Isogeny-Based Cryptography Gabriell Orisaka 1, Diego F. Aranha 1,2, Julio López 1 1 Institute of Computing, University of Campinas, Brazil 2 Department of Engineering,

More information

Heron Quadrilaterals with Sides in Arithmetic or Geometric Progression

Heron Quadrilaterals with Sides in Arithmetic or Geometric Progression Heron Quadrilaterals with Sides in Arithmetic or Geometric Progression R.H.Buchholz & J.A.MacDougall Abstract We study triangles and cyclic quadrilaterals which have rational area and whose sides form

More information

Worst-case running time for RANDOMIZED-SELECT

Worst-case running time for RANDOMIZED-SELECT Worst-case running time for RANDOMIZED-SELECT is ), even to nd the minimum The algorithm has a linear expected running time, though, and because it is randomized, no particular input elicits the worst-case

More information

Elliptic Curve Cryptosystem

Elliptic Curve Cryptosystem UDC 681.8 Elliptic Curve Cryptosystem VNaoya Torii VKazuhiro Yokoyama (Manuscript received June 6, 2000) This paper describes elliptic curve cryptosystems (ECCs), which are expected to become the next-generation

More information

LECTURE 13, THURSDAY APRIL 1, 2004

LECTURE 13, THURSDAY APRIL 1, 2004 LECTURE 13, THURSDAY APRIL 1, 2004 FRANZ LEMMERMEYER 1. Parametrizing Curves of Genus 0 As a special case of the theorem that curves of genus 0, in particular those with the maximal number of double points,

More information

Tutorial: Computable Model Theory and Differential Algebra

Tutorial: Computable Model Theory and Differential Algebra Tutorial: Computable Model Theory and Differential Algebra Russell Miller, Queens College & Graduate Center C.U.N.Y. April 12, 2007 Workshop in Differential Algebra and Related Topics Rutgers University,

More information

Arithmetic in Quaternion Algebras

Arithmetic in Quaternion Algebras Arithmetic in Quaternion Algebras Graduate Algebra Symposium Jordan Wiebe University of Oklahoma November 5, 2016 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras November 5, 2016

More information

Parallel Rewriting of Graphs through the. Pullback Approach. Michel Bauderon 1. Laboratoire Bordelais de Recherche en Informatique

Parallel Rewriting of Graphs through the. Pullback Approach. Michel Bauderon 1. Laboratoire Bordelais de Recherche en Informatique URL: http://www.elsevier.nl/locate/entcs/volume.html 8 pages Parallel Rewriting of Graphs through the Pullback Approach Michel Bauderon Laboratoire Bordelais de Recherche en Informatique Universite Bordeaux

More information

SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm

SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm SM9 identity-based cryptographic algorithms Part 2: Digital signature algorithm Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 message... 1 3.2 signed message... 1 3.3

More information

Fast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA

Fast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA Fast Hardware Architectures for Supersingular Isogeny Die-Hellman Key Exchange on FPGA Brian Koziel 1, Reza Azarderakhsh 2, and Mehran Mozaari-Kermani 3 1 Texas Instruments, kozielbrian@gmail.com. 2 CEECS

More information

Some Highlights along a Path to Elliptic Curves

Some Highlights along a Path to Elliptic Curves Some Highlights along a Path to Elliptic Curves Part 6: Rational Points on Elliptic Curves Steven J. Wilson, Fall 016 Outline of the Series 1. The World of Algebraic Curves. Conic Sections and Rational

More information

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt

On the Diculty of Software Key Escrow. Abstract. At Eurocrypt'95, Desmedt suggested a scheme which allows individuals to encrypt On the Diculty of Software Key Escrow Lars R. Knudsen Katholieke Universiteit Leuven Dept. Elektrotechniek-ESAT Kardinaal Mercierlaan 94 B-3001 Heverlee Torben P. Pedersen y Cryptomathic Arhus Science

More information

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY

A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY A GRAPH FROM THE VIEWPOINT OF ALGEBRAIC TOPOLOGY KARL L. STRATOS Abstract. The conventional method of describing a graph as a pair (V, E), where V and E repectively denote the sets of vertices and edges,

More information

36 Modular Arithmetic

36 Modular Arithmetic 36 Modular Arithmetic Tom Lewis Fall Term 2010 Tom Lewis () 36 Modular Arithmetic Fall Term 2010 1 / 10 Outline 1 The set Z n 2 Addition and multiplication 3 Modular additive inverse 4 Modular multiplicative

More information

reasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap

reasonable to store in a software implementation, it is likely to be a signicant burden in a low-cost hardware implementation. We describe in this pap Storage-Ecient Finite Field Basis Conversion Burton S. Kaliski Jr. 1 and Yiqun Lisa Yin 2 RSA Laboratories 1 20 Crosby Drive, Bedford, MA 01730. burt@rsa.com 2 2955 Campus Drive, San Mateo, CA 94402. yiqun@rsa.com

More information

A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms

A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms 2614 IEEE TRANSACTIONS ON COMPUTERS, VOL. 63, NO. 10, OCTOBER 2014 A New Double Point Multiplication Algorithm Its Application to Binary Elliptic Curves with Endomorphisms Reza Azarderakhsh Koray Karabina

More information

Discrete Mathematics SECOND EDITION OXFORD UNIVERSITY PRESS. Norman L. Biggs. Professor of Mathematics London School of Economics University of London

Discrete Mathematics SECOND EDITION OXFORD UNIVERSITY PRESS. Norman L. Biggs. Professor of Mathematics London School of Economics University of London Discrete Mathematics SECOND EDITION Norman L. Biggs Professor of Mathematics London School of Economics University of London OXFORD UNIVERSITY PRESS Contents PART I FOUNDATIONS Statements and proofs. 1

More information

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography

Understanding Cryptography by Christof Paar and Jan Pelzl. Chapter 9 Elliptic Curve Cryptography Understanding Cryptography by Christof Paar and Jan Pelzl www.crypto-textbook.com Chapter 9 Elliptic Curve Cryptography ver. February 2nd, 2015 These slides were prepared by Tim Güneysu, Christof Paar

More information

What is a Graphon? Daniel Glasscock, June 2013

What is a Graphon? Daniel Glasscock, June 2013 What is a Graphon? Daniel Glasscock, June 2013 These notes complement a talk given for the What is...? seminar at the Ohio State University. The block images in this PDF should be sharp; if they appear

More information

On the automorphism group of the m-coloured random graph

On the automorphism group of the m-coloured random graph On the automorphism group of the m-coloured random graph Peter J. Cameron and Sam Tarzi School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS, UK p.j.cameron@qmul.ac.uk

More information

RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES. Contents 1. Introduction 1 2. The proof of Theorem References 9

RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES. Contents 1. Introduction 1 2. The proof of Theorem References 9 RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES IZZET COSKUN AND JASON STARR Abstract. We prove that the space of rational curves of a fixed degree on any smooth cubic hypersurface of dimension at least

More information

Talks at Mathematical Structures for Cryptography

Talks at Mathematical Structures for Cryptography Talks at Mathematical Structures for Cryptography August 9, 2016 Andreas Enge (INRIA Bordeaux-Sud-Ouest & IMB, Université de Bordeaux ) Title: Short addition sequences for theta functions (joint work with

More information

Sheaves and Stacks. November 5, Sheaves and Stacks

Sheaves and Stacks. November 5, Sheaves and Stacks November 5, 2014 Grothendieck topologies Grothendieck topologies are an extra datum on a category. They allow us to make sense of something being locally defined. Give a formal framework for glueing problems

More information

An Introduction to Belyi Surfaces

An Introduction to Belyi Surfaces An Introduction to Belyi Surfaces Matthew Stevenson December 16, 2013 We outline the basic theory of Belyi surfaces, up to Belyi s theorem (1979, [1]), which characterizes these spaces as precisely those

More information

EQUIVARIANT COMPLETE SEGAL SPACES

EQUIVARIANT COMPLETE SEGAL SPACES EQUIVARIANT COMPLETE SEGAL SPACES JULIA E. BERGNER AND STEVEN GREG CHADWICK Abstract. In this paper we give a model for equivariant (, 1)-categories. We modify an approach of Shimakawa for equivariant

More information

Arithmetic in Quaternion Algebras

Arithmetic in Quaternion Algebras Arithmetic in Quaternion Algebras 31st Automorphic Forms Workshop Jordan Wiebe University of Oklahoma March 6, 2017 Jordan Wiebe (University of Oklahoma) Arithmetic in Quaternion Algebras March 6, 2017

More information

Chordal graphs and the characteristic polynomial

Chordal graphs and the characteristic polynomial Discrete Mathematics 262 (2003) 211 219 www.elsevier.com/locate/disc Chordal graphs and the characteristic polynomial Elizabeth W. McMahon ;1, Beth A. Shimkus 2, Jessica A. Wolfson 3 Department of Mathematics,

More information

Provably Secure and Efficient Cryptography

Provably Secure and Efficient Cryptography Provably Secure and Efficient Cryptography Tsuyoshi TAKAGI TU Darmstadt ttakagi@cdc.informatik.tu-darmstadt.de http://www.informatik.tu-darmstadt.de/ti/ Contents Overview NICE Cryptosystem Provable Security

More information

Chordal Graphs and Minimal Free Resolutions

Chordal Graphs and Minimal Free Resolutions Chordal Graphs and Minimal Free Resolutions David J. Marchette David A. Johannsen Abstract The problem of computing the minimal free resolution of the edge ideal of a graph has attracted quite a bit of

More information

Extending partial projective planes

Extending partial projective planes Extending partial projective planes J. B. Nation In honor of my colleagues, Ralph Freese and Bill Lampe Abstract. This note discusses a computational method for constructing finite projective planes. Mathematics

More information

K 4,4 e Has No Finite Planar Cover

K 4,4 e Has No Finite Planar Cover K 4,4 e Has No Finite Planar Cover Petr Hliněný Dept. of Applied Mathematics, Charles University, Malostr. nám. 25, 118 00 Praha 1, Czech republic (E-mail: hlineny@kam.ms.mff.cuni.cz) February 9, 2005

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES

A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES JULIA E. BERGNER Abstract. In this paper we put a cofibrantly generated model category structure on the category of small simplicial

More information

arxiv: v1 [math.gr] 31 Dec 2009

arxiv: v1 [math.gr] 31 Dec 2009 arxiv:1001.0086v1 [math.gr] 31 Dec 2009 Computing the Maximum Slope Invariant in Tubular Groups Christopher H. Cashen Department of Mathematics University of Utah Salt Lake City, UT 8112 cashen@math.utah.edu

More information

Tilings of the Euclidean plane

Tilings of the Euclidean plane Tilings of the Euclidean plane Yan Der, Robin, Cécile January 9, 2017 Abstract This document gives a quick overview of a eld of mathematics which lies in the intersection of geometry and algebra : tilings.

More information

9/24/ Hash functions

9/24/ Hash functions 11.3 Hash functions A good hash function satis es (approximately) the assumption of SUH: each key is equally likely to hash to any of the slots, independently of the other keys We typically have no way

More information

CUBICAL SIMPLICIAL VOLUME OF SURFACES

CUBICAL SIMPLICIAL VOLUME OF SURFACES CUBICAL SIMPLICIAL VOLUME OF SURFACES CLARA LÖH AND CHRISTIAN PLANKL ABSTRACT. Cubical simplicial volume is a variation on simplicial volume, based on cubes instead of simplices. Both invariants are homotopy

More information

Notes for Lecture 10

Notes for Lecture 10 COS 533: Advanced Cryptography Lecture 10 (October 16, 2017) Lecturer: Mark Zhandry Princeton University Scribe: Dylan Altschuler Notes for Lecture 10 1 Motivation for Elliptic Curves Diffie-Hellman For

More information

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31

ECC Elliptic Curve Cryptography. Foundations of Cryptography - ECC pp. 1 / 31 ECC Elliptic Curve Cryptography Foundations of Cryptography - ECC pp. 1 / 31 Elliptic Curve an elliptic curve E is a smooth, projective, algebraic curve defined by the following equation: y 2 3 2 a xy

More information

An Investigation of Closed Geodesics on Regular Polyhedra

An Investigation of Closed Geodesics on Regular Polyhedra An Investigation of Closed Geodesics on Regular Polyhedra Tony Scoles Southern Illinois University Edwardsville May 13, 2008 1 Introduction This paper was undertaken to examine, in detail, results from

More information

Introduction to Public-Key Cryptography

Introduction to Public-Key Cryptography Introduction to Public-Key Cryptography Nadia Heninger University of Pennsylvania June 11, 2018 We stand today on the brink of a revolution in cryptography. Diffie and Hellman, 1976 Symmetric cryptography

More information

SPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES

SPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES SPERNER S LEMMA, BROUWER S FIXED-POINT THEOREM, AND THE SUBDIVISION OF SQUARES INTO TRIANGLES AKHIL MATHEW Abstract These are notes from a talk I gave for high-schoolers at the Harvard- MIT Mathematics

More information

New Strategies for Filtering the Number Field Sieve Matrix

New Strategies for Filtering the Number Field Sieve Matrix New Strategies for Filtering the Number Field Sieve Matrix Shailesh Patil Department of CSA Indian Institute of Science Bangalore 560 012 India Email: shailesh.patil@gmail.com Gagan Garg Department of

More information

Elliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve

Elliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and

More information

Extending partial projective planes

Extending partial projective planes Extending partial projective planes J. B. Nation In honor of my colleagues, Ralph Freese and Bill Lampe Abstract. This note discusses a computational method for constructing finite projective planes. Mathematics

More information

arxiv: v1 [math.gt] 28 Feb 2009

arxiv: v1 [math.gt] 28 Feb 2009 Coverings and Minimal Triangulations of 3 Manifolds William Jaco, Hyam Rubinstein and Stephan Tillmann arxiv:0903.0112v1 [math.gt] 28 Feb 2009 Abstract This paper uses results on the classification of

More information

Chapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition.

Chapter 3. Quadric hypersurfaces. 3.1 Quadric hypersurfaces Denition. Chapter 3 Quadric hypersurfaces 3.1 Quadric hypersurfaces. 3.1.1 Denition. Denition 1. In an n-dimensional ane space A; given an ane frame fo;! e i g: A quadric hypersurface in A is a set S consisting

More information

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3

A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 A TESSELLATION FOR ALGEBRAIC SURFACES IN CP 3 ANDREW J. HANSON AND JI-PING SHA In this paper we present a systematic and explicit algorithm for tessellating the algebraic surfaces (real 4-manifolds) F

More information

Finding a winning strategy in variations of Kayles

Finding a winning strategy in variations of Kayles Finding a winning strategy in variations of Kayles Simon Prins ICA-3582809 Utrecht University, The Netherlands July 15, 2015 Abstract Kayles is a two player game played on a graph. The game can be dened

More information

The language of categories

The language of categories The language of categories Mariusz Wodzicki March 15, 2011 1 Universal constructions 1.1 Initial and inal objects 1.1.1 Initial objects An object i of a category C is said to be initial if for any object

More information

Public Key Cryptography and RSA

Public Key Cryptography and RSA Public Key Cryptography and RSA Major topics Principles of public key cryptosystems The RSA algorithm The Security of RSA Motivations A public key system is asymmetric, there does not have to be an exchange

More information

Algorithms and arithmetic for the implementation of cryptographic pairings

Algorithms and arithmetic for the implementation of cryptographic pairings Cairn seminar November 29th, 2013 Algorithms and arithmetic for the implementation of cryptographic pairings Nicolas Estibals CAIRN project-team, IRISA Nicolas.Estibals@irisa.fr What is an elliptic curve?

More information

One Key to Rule Them All

One Key to Rule Them All One Key to Rule Them All Nigel P. Smart Extended Enterprise Laboratory HP Laboratories Bristol HPL-1999-26 March, 1999 cryptographic keys We show how to specify an elliptic curve public key, RSA public

More information

NICOLAS BOURBAKI ELEMENTS OF MATHEMATICS. General Topology. Chapters 1-4. Springer-Verlag Berlin Heidelberg New York London Paris Tokyo

NICOLAS BOURBAKI ELEMENTS OF MATHEMATICS. General Topology. Chapters 1-4. Springer-Verlag Berlin Heidelberg New York London Paris Tokyo NICOLAS BOURBAKI ELEMENTS OF MATHEMATICS General Topology Chapters 1-4 Springer-Verlag Berlin Heidelberg New York London Paris Tokyo ADVICE TO THE READER v CONTENTS OF THE ELEMENTS OF MATHEMATICS SERIES

More information

Hecke module structure of quaternions

Hecke module structure of quaternions Hecke module structure of quaternions David R. Kohel Abstract The arithmetic of quaternions is recalled from a constructive point of view. A Hecke module is introduced, defined as a free abelian group

More information

Elliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve

Elliptic Curve Cryptography (ECC) Elliptic Curve Cryptography. Elliptic Curves. Elliptic Curve Cryptography (ECC) Elliptic curve Elliptic Curve Cryptography Gerardo Pelosi Dipartimento di Elettronica, Informazione e Bioingegneria (DEIB) Politecnico di Milano gerardo.pelosi - at - polimi.it ECC was introduced by Victor Miller and

More information

Newton Polygons of L-Functions

Newton Polygons of L-Functions Newton Polygons of L-Functions Phong Le Department of Mathematics University of California, Irvine June 2009/Ph.D. Defense Phong Le Newton Polygons of L-Functions 1/33 Laurent Polynomials Let q = p a where

More information

Graph Theory Questions from Past Papers

Graph Theory Questions from Past Papers Graph Theory Questions from Past Papers Bilkent University, Laurence Barker, 19 October 2017 Do not forget to justify your answers in terms which could be understood by people who know the background theory

More information

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations. A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department

More information

UNIVERSITY OF CALGARY. Improved Arithmetic in the Ideal Class Group of Imaginary Quadratic Number Fields. With an Application to Integer Factoring

UNIVERSITY OF CALGARY. Improved Arithmetic in the Ideal Class Group of Imaginary Quadratic Number Fields. With an Application to Integer Factoring UNIVERSITY OF CALGARY Improved Arithmetic in the Ideal Class Group of Imaginary Quadratic Number Fields With an Application to Integer Factoring by Maxwell Sayles A THESIS SUBMITTED TO THE FACULTY OF GRADUATE

More information

SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol

SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol SM9 identity-based cryptographic algorithms Part 3: Key exchange protocol Contents 1 Scope... 1 2 Normative references... 1 3 Terms and definitions... 1 3.1 key exchange... 1 3.2 key agreement... 1 3.3

More information

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects

A technique for adding range restrictions to. August 30, Abstract. In a generalized searching problem, a set S of n colored geometric objects A technique for adding range restrictions to generalized searching problems Prosenjit Gupta Ravi Janardan y Michiel Smid z August 30, 1996 Abstract In a generalized searching problem, a set S of n colored

More information

Eulerian subgraphs containing given edges

Eulerian subgraphs containing given edges Discrete Mathematics 230 (2001) 63 69 www.elsevier.com/locate/disc Eulerian subgraphs containing given edges Hong-Jian Lai Department of Mathematics, West Virginia University, P.O. Box. 6310, Morgantown,

More information

Key Exchange. Secure Software Systems

Key Exchange. Secure Software Systems 1 Key Exchange 2 Challenge Exchanging Keys &!"#h%&'() & & 1 2 6(6 1) 2 15! $ The more parties in communication, the more keys that need to be securely exchanged " # Do we have to use out-of-band methods?

More information

From String Theory to Elliptic Curves over Finite Field, F p

From String Theory to Elliptic Curves over Finite Field, F p From String Theory to Elliptic Curves over Finite Field, F p A Senior Project submitted to The Division of Science, Mathematics, and Computing of Bard College by Linh Thi Dieu Pham Annandale-on-Hudson,

More information

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the

Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the Foreword Preface About the Author Aperitifs The Lexicon of Cryptography Cryptographic Systems Cryptanalysis Side Information Thomas Jefferson and the M-94 Cryptography and History Cryptography and Computers

More information

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude

Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude Paul C. van Oorschot and Michael J. Wiener Bell-Northern Research, P.O. Box 3511 Station C, Ottawa, Ontario, K1Y 4H7, Canada {paulv,wiener}@bnr.ca

More information

Math 162b Syllabus p-adic Galois Representations

Math 162b Syllabus p-adic Galois Representations Math 162b Syllabus p-adic Galois Representations Andrei Jorza 2012-01-03 Contents 1 Local Class Field Theory 1.1 Local fields 1.2 Newton polygons 1.3 Ramification of local fields 1.4 Main results of local

More information

4. Simplicial Complexes and Simplicial Homology

4. Simplicial Complexes and Simplicial Homology MATH41071/MATH61071 Algebraic topology Autumn Semester 2017 2018 4. Simplicial Complexes and Simplicial Homology Geometric simplicial complexes 4.1 Definition. A finite subset { v 0, v 1,..., v r } R n

More information

pα i + q, where (n, m, p and q depend on i). 6. GROMOV S INVARIANT AND THE VOLUME OF A HYPERBOLIC MANIFOLD

pα i + q, where (n, m, p and q depend on i). 6. GROMOV S INVARIANT AND THE VOLUME OF A HYPERBOLIC MANIFOLD 6. GROMOV S INVARIANT AND THE VOLUME OF A HYPERBOLIC MANIFOLD of π 1 (M 2 )onπ 1 (M 4 ) by conjugation. π 1 (M 4 ) has a trivial center, so in other words the action of π 1 (M 4 ) on itself is effective.

More information

or else take their intersection. Now define

or else take their intersection. Now define Samuel Lee Algebraic Topology Homework #5 May 10, 2016 Problem 1: ( 1.3: #3). Let p : X X be a covering space with p 1 (x) finite and nonempty for all x X. Show that X is compact Hausdorff if and only

More information

Chapter 2 The Language PCF

Chapter 2 The Language PCF Chapter 2 The Language PCF We will illustrate the various styles of semantics of programming languages with an example: the language PCF Programming language for computable functions, also called Mini-ML.

More information

RSA. Public Key CryptoSystem

RSA. Public Key CryptoSystem RSA Public Key CryptoSystem DIFFIE AND HELLMAN (76) NEW DIRECTIONS IN CRYPTOGRAPHY Split the Bob s secret key K to two parts: K E, to be used for encrypting messages to Bob. K D, to be used for decrypting

More information

6c Lecture 3 & 4: April 8 & 10, 2014

6c Lecture 3 & 4: April 8 & 10, 2014 6c Lecture 3 & 4: April 8 & 10, 2014 3.1 Graphs and trees We begin by recalling some basic definitions from graph theory. Definition 3.1. A (undirected, simple) graph consists of a set of vertices V and

More information

BRAUER GROUPS: TALK 1

BRAUER GROUPS: TALK 1 BRAUER GROUPS: TALK 1 JEREMY BOOHER In this first talk, we will discuss the topological Brauer group and the Brauer group of Spec k, which are classically studied in the guise of central simple algebras.

More information

Graph Theory Problem Ideas

Graph Theory Problem Ideas Graph Theory Problem Ideas April 15, 017 Note: Please let me know if you have a problem that you would like me to add to the list! 1 Classification Given a degree sequence d 1,...,d n, let N d1,...,d n

More information

On the Component Number of Links from Plane Graphs

On the Component Number of Links from Plane Graphs On the Component Number of Links from Plane Graphs Daniel S. Silver Susan G. Williams January 20, 2015 Abstract A short, elementary proof is given of the result that the number of components of a link

More information

A Fine Partitioning of Cells

A Fine Partitioning of Cells A Fine Partitioning of Cells Atlas of Lie Groups Workshop American Institute of Mathematics Palo Alto, July 16-20, 2007 1. The setting in Atlas Let me begin by talking a bit about the organization of the

More information

Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings

Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings International Journal of Network Security, Vol.5, No.3, PP.283 287, Nov. 2007 283 Group Oriented Identity-Based Deniable Authentication Protocol from the Bilinear Pairings Rongxing Lu and Zhenfu Cao (Corresponding

More information

The Edge Slide Graph of the 3-cube

The Edge Slide Graph of the 3-cube Rose-Hulman Undergraduate Mathematics Journal Volume 12 Issue 2 Article 6 The Edge Slide Graph of the 3-cube Lyndal Henden Massey University, Palmerston North, New Zealand, lyndal_henden@hotmail.com Follow

More information

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1

Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 CME 305: Discrete Mathematics and Algorithms Instructor: Professor Aaron Sidford (sidford@stanford.edu) January 11, 2018 Lecture 2 - Graph Theory Fundamentals - Reachability and Exploration 1 In this lecture

More information

The Complexity of Change

The Complexity of Change The Complexity of Change JAN VAN DEN HEUVEL Utrecht, 3 April 2014 Department of Mathematics London School of Economics and Political Science A classical puzzle: the 15-Puzzle 13 2 3 12 1 2 3 4 9 11 1 10

More information

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have

Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have Let v be a vertex primed by v i (s). Then the number f(v) of neighbours of v which have been red in the sequence up to and including v i (s) is deg(v)? s(v), and by the induction hypothesis this sequence

More information

Whitney s theorem for 2-regular planar digraphs

Whitney s theorem for 2-regular planar digraphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 67(2) (2017), Pages 159 165 Whitney s theorem for 2-regular planar digraphs an Archdeacon epartment of Mathematics and Statistics University of Vermont Burlington,

More information