{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:19Z","timestamp":1772893039968,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031803109","type":"print"},{"value":"9783031803116","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_8","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:30:52Z","timestamp":1733963452000},"page":"159-179","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Isogeny Interpolation and\u00a0the\u00a0Computation of\u00a0Isogenies from\u00a0Higher Dimensional Representations"],"prefix":"10.1007","author":[{"given":"David","family":"Jao","sequence":"first","affiliation":[]},{"given":"Jeanne","family":"Laflamme","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"8_CR1","unstructured":"Basso, A., et al.: SQIsign2D-West: the fast, the small, and the safer. Cryptology ePrint Archive, Paper 2024\/760 (2024). https:\/\/eprint.iacr.org\/2024\/760"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology, ASIACRYPT 2023. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"8_CR3","doi-asserted-by":"publisher","first-page":"01","DOI":"10.4064\/aa165-3-1","volume":"165","author":"N Bruin","year":"2014","unstructured":"Bruin, N., Flynn, E.V., Testa, D.: Descent via (3,3)-isogeny on Jacobians of genus 2 curves. Acta Arith 165, 01 (2014)","journal-title":"Acta Arith"},{"issue":"177","key":"8_CR4","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1090\/S0025-5718-1987-0866101-0","volume":"48","author":"DG Cantor","year":"1987","unstructured":"Cantor, D.G.: Computing in the Jacobian of a hyperelliptic curve. Math. Comp. 48(177), 95\u2013101 (1987)","journal-title":"Math. Comp."},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology, EUROCRYPT 2023. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"8_CR6","volume-title":"Applications Des Fonctions Th\u00eata \u00e0 La Cryptographie Sur Courbes Hyperelliptiques","author":"R Cosset","year":"2011","unstructured":"Cosset, R.: Applications Des Fonctions Th\u00eata \u00e0 La Cryptographie Sur Courbes Hyperelliptiques. Universit\u00e9 Henri Poincar\u00e9 - Nancy I, Theses (2011)"},{"issue":"294","key":"8_CR7","doi-asserted-by":"publisher","first-page":"1953","DOI":"10.1090\/S0025-5718-2014-02899-8","volume":"84","author":"R Cosset","year":"2015","unstructured":"Cosset, R., Robert, D.: Computing $$(\\ell ,\\ell )$$-isogenies in polynomial time on Jacobians of genus 2 curves. Math. Comput. 84(294), 1953\u20131975 (2015)","journal-title":"Math. Comput."},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) Advances in Cryptology, EUROCRYPT 2024. LNCS, vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Decru, T., Kunzweiler, S.: Efficient computation of $$(3^n,3^n)$$ -isogenies. In: El Mrabet, N., De Feo, L., Duquesne, S. (eds.) Progress in Cryptology, AFRICACRYPT 2023. LNCS, vol. 14064, pp. 53\u201378. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-37679-5_3","DOI":"10.1007\/978-3-031-37679-5_3"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology, EUROCRYPT 2023. LNCS, vol. 14008, pp. 282\u2013309. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_10","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"8_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2"},{"issue":"485","key":"8_CR12","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1515\/crll.1997.485.93","volume":"1997","author":"E Kani","year":"1997","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. J. F\u00fcr Die R. Und Angew. Math. 1997(485), 93\u2013122 (1997)","journal-title":"J. F\u00fcr Die R. Und Angew. Math."},{"issue":"333","key":"8_CR13","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1090\/mcom\/3672","volume":"91","author":"M Kirschmer","year":"2021","unstructured":"Kirschmer, M., Narbonne, F., Ritzenthaler, C., Robert, D.: Spanning the isogeny class of a power of an elliptic curve. Math. Comp. 91(333), 401\u2013449 (2021)","journal-title":"Math. Comp."},{"key":"8_CR14","unstructured":"KULeuven-COSIC. (3,3)-isogenies (2023). https:\/\/github.com\/KULeuven-COSIC\/3_3_isogenies"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Fast change of level and applications to isogenies. Res. Num. Theor. 9(1), 7 (2022)","DOI":"10.1007\/s40993-022-00407-9"},{"key":"8_CR16","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology, CRYPTO 2024. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"8_CR17","unstructured":"Nakagawa, K., Onuki, H.: SQIsign2D-East: a new signature scheme using 2-dimensional isogenies. Cryptology ePrint Archive, Paper 2024\/771 (2024). https:\/\/eprint.iacr.org\/2024\/771"},{"key":"8_CR18","unstructured":"Oudompheng, R., Pope, G.: A note on reimplementing the Castryck-Decru attack and lessons learned for SageMath. Cryptology ePrint Archive, paper 2022\/1283 (2022). https:\/\/eprint.iacr.org\/2022\/1283"},{"key":"8_CR19","unstructured":"Robert, D.: Avisogenies magma package, version 0.7 (2021). https:\/\/gitlab.inria.fr\/roberdam\/avisogenies\/"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Robert, D: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology, EUROCRYPT 2023. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"8_CR21","unstructured":"Robert, D.: On the efficient representation of isogenies. Cryptology ePrint Archive, paper 2024\/1071 (2024). https:\/\/eprint.iacr.org\/2024\/1071"},{"key":"8_CR22","unstructured":"Santos, M.C.R., Costello, C., Smith, B.: Efficient (3,3)-isogenies on fast Kummer surfaces. Cryptology ePrint Archive, Paper 2024\/144 (2024). https:\/\/eprint.iacr.org\/2024\/144"},{"key":"8_CR23","unstructured":"Santos, M.C.R., Flynn, E.V.: Isogenies on Kummer surfaces. arXiv:2409.14819 (2024). https:\/\/arxiv.org\/abs\/2409.14819"},{"key":"8_CR24","unstructured":"Smith, B.A.: Explicit endomorphisms and correspondences. PhD thesis, University of Sydney 2005-12-23"},{"key":"8_CR25","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes-Rendus de l\u2019Acad\u00e9mie des Sciences, S\u00e9rie I 273, 238\u2013241 (1971). juillet"},{"key":"8_CR26","unstructured":"Yoshizumi, R., Onuki, H., Ohashi, R., Kudo, M., Nuida, K.: Efficient theta-based algorithms for computing $$(\\ell , \\ell )$$-isogenies on Kummer surfaces for arbitrary odd $$\\ell $$. Cryptology ePrint Archive, Paper 2024\/1519 (2024). https:\/\/eprint.iacr.org\/2024\/1519"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:48Z","timestamp":1733965368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}