In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks. We also prove that these graphs have some interesting properties, for example they are expanders. The last chapter is devoted to the study of the cryptosystem CSIDH, which is a relatively new (conjectured) quantum-resistant proposal based on isogeny graphs.

In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks. We also prove that these graphs have some interesting properties, for example they are expanders. The last chapter is devoted to the study of the cryptosystem CSIDH, which is a relatively new (conjectured) quantum-resistant proposal based on isogeny graphs.

Isogeny Graphs and Cryptographic Applications

OSTUZZI, MASSIMO
2022/2023

Abstract

In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks. We also prove that these graphs have some interesting properties, for example they are expanders. The last chapter is devoted to the study of the cryptosystem CSIDH, which is a relatively new (conjectured) quantum-resistant proposal based on isogeny graphs.
2022
Isogeny Graphs and Cryptographic Applications
In this thesis, we aim to develop the theory of elliptic curves in order to understand the shape of isogeny graphs. This kind of graphs are used as a new cryptographic primitive to resist against quantum key-recovery attacks. We also prove that these graphs have some interesting properties, for example they are expanders. The last chapter is devoted to the study of the cryptosystem CSIDH, which is a relatively new (conjectured) quantum-resistant proposal based on isogeny graphs.
Isogeny Graphs
Elliptic Curves
CSIDH
Post-Quantum Crypt
File in questo prodotto:
File Dimensione Formato  
Ostuzzi_Massimo.pdf

accesso aperto

Dimensione 709.73 kB
Formato Adobe PDF
709.73 kB Adobe PDF Visualizza/Apri

The text of this website © Università degli studi di Padova. Full Text are published under a non-exclusive license. Metadata are under a CC0 License

Utilizza questo identificativo per citare o creare un link a questo documento: https://hdl.handle.net/20.500.12608/50189