{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:43:40Z","timestamp":1765370620319,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031828515"},{"type":"electronic","value":"9783031828522"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-82852-2_8","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:13Z","timestamp":1741784533000},"page":"178-202","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Optimally Small Smoothness Bounds for\u00a0Cryptographic-Sized Smooth Twins and\u00a0Their Isogeny-Based Applications"],"prefix":"10.1007","author":[{"given":"Bruno","family":"Sterner","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"key":"8_CR1","unstructured":"Ahrens, K.: Sieving for large twin smooth integers using single solutions to prouhet-tarry-escott. Cryptology ePrint Archive, Paper 2023\/219 (2023). https:\/\/eprint.iacr.org\/2023\/219"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Basso, A., Fouotsa, T.B.: New SIDH countermeasures for a more efficient key exchange. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2023. ASIACRYPT 2023. LNCS, vol. 14445, pp. 208\u2013233. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8742-9_7","DOI":"10.1007\/978-981-99-8742-9_7"},{"key":"8_CR3","unstructured":"Bernstein, D.J.: How to find smooth parts of integers (2004). http:\/\/cryp.to\/papers.html#smoothparts. ID 201a045d5bb24f43f0bd0d97fcf5355a. Citations in this document"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2140\/obs.2020.4.39","volume":"4","author":"DJ Bernstein","year":"2020","unstructured":"Bernstein, D.J., De Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. Open Book Series 4(1), 39\u201355 (2020)","journal-title":"Open Book Series"},{"issue":"244","key":"8_CR5","doi-asserted-by":"publisher","first-page":"2063","DOI":"10.1090\/S0025-5718-02-01504-1","volume":"72","author":"P Borwein","year":"2003","unstructured":"Borwein, P., Lison\u011bk, P., Percival, C.: Computational investigations of the Prouhet-Tarry-Escott problem. Math. Comput. 72(244), 2063\u20132070 (2003)","journal-title":"Math. Comput."},{"key":"8_CR6","volume-title":"Crypto Security Optimizations","author":"G Bruno","year":"2021","unstructured":"Bruno, G., Batina, L., Bosma, W.: Crypto Security Optimizations. Radboud University Nijmegen, Nijmegen, The Netherlands (2021)"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Bruno, G. et al. (2023). Cryptographic Smooth Neighbors. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2023. ASIACRYPT 2023. LNCS, vol. 14444, pp. 190\u2013221. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_7","DOI":"10.1007\/978-981-99-8739-9_7"},{"key":"8_CR8","unstructured":"Buzek, J., Hasan, J., Liu, J., Naehrig, M., Vigil, A.: Finding twin smooth integers by solving Pell equations (2022)"},{"key":"8_CR9","unstructured":"Caley, T.: The Prouhet-Tarry-Escott problem (2013)"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"8_CR11","unstructured":"Chavez-Saab, J.\u00a0 et\u00a0al.: SQIsign (2023). https:\/\/sqisign.org"},{"issue":"2","key":"8_CR12","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1080\/10586458.2013.768483","volume":"22","author":"JB Conrey","year":"2013","unstructured":"Conrey, J.B., Holmstrom, M.A., McLaughlin, T.L.: Smooth neighbors. Exp. Math. 22(2), 195\u2013202 (2013)","journal-title":"Exp. Math."},{"key":"8_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-030-64834-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"C Costello","year":"2020","unstructured":"Costello, C.: B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 440\u2013463. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_15"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-030-77870-5_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"C Costello","year":"2021","unstructured":"Costello, C., Meyer, M., Naehrig, M.: Sieving for twin smooth integers with solutions to the Prouhet-tarry-Escott problem. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 272\u2013301. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_10"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Crandall, R.E., Pomerance, C.: Prime Numbers. Springer, New York (2001)","DOI":"10.1007\/978-1-4684-9316-0"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1016\/S1385-7258(66)50029-4","volume":"38","author":"NG de Bruijn","year":"1966","unstructured":"de Bruijn, N.G.: On the number of positive integers $$\\le $$ x and free of prime factors $$> y$$, II. Indag. Math. 38, 239\u2013247 (1966)","journal-title":"Indag. Math."},{"key":"8_CR17","unstructured":"Dickman, K.: On the frequency of numbers containing prime factors of a certain relative magnitude. Arkiv for matematik, astronomi och fysik 22(10), A\u201310 (1930)"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-030-92068-5_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2021","author":"L De Feo","year":"2021","unstructured":"De Feo, L., et al.: S\u00e9ta: supersingular encryption from\u00a0torsion attacks. In: Tibouchi, M., Wang, H. (eds.) ASIACRYPT 2021. LNCS, vol. 13093, pp. 249\u2013278. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-92068-5_9"},{"key":"8_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023. EUROCRYPT 2023. LNCS, vol. 14008, pp. 282\u2013309. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_10","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"8_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.-Y. (ed.) PQCrypto 2011. LNCS, vol. 7071, pp. 19\u201334. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2"},{"issue":"1","key":"8_CR22","first-page":"57","volume":"8","author":"DH Lehmer","year":"1964","unstructured":"Lehmer, D.H.: On a problem of St\u00f6rmer. Ill. J. Math. 8(1), 57\u201379 (1964)","journal-title":"Ill. J. Math."},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds) Advances in Cryptology \u2013 EUROCRYPT 2023. EUROCRYPT 2023, LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"issue":"187","key":"8_CR24","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1090\/S0025-5718-1989-0969490-3","volume":"53","author":"G Marsaglia","year":"1989","unstructured":"Marsaglia, G., Zaman, A., Marsaglia, J.C.W.: Numerical solution of some classical differential-difference equations. Math. Comput. 53(187), 191\u2013201 (1989)","journal-title":"Math. Comput."},{"key":"8_CR25","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1006\/jnth.2001.2722","volume":"93","author":"G Martin","year":"1999","unstructured":"Martin, G.: An asymptotic formula for the number of smooth values of a polynomial. J. Number Theory 93, 108\u2013182 (1999)","journal-title":"J. Number Theory"},{"issue":"177","key":"8_CR26","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1090\/S0025-5718-1987-0866113-7","volume":"48","author":"PL Montgomery","year":"1987","unstructured":"Montgomery, P.L.: Speeding the pollard and elliptic curve methods of factorization. Math. Comput. 48(177), 243\u2013264 (1987)","journal-title":"Math. Comput."},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Robert, D. (2023). Breaking SIDH in Polynomial Time. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"8_CR28","volume-title":"A Computational Introduction to Number Theory and Algebra","author":"V Shoup","year":"2009","unstructured":"Shoup, V.: A Computational Introduction to Number Theory and Algebra, 2nd edn. Cambridge University Press, USA (2009)","edition":"2"},{"key":"8_CR29","unstructured":"St\u00f8rmer, C.: Quelques th\u00e9or\u00e8mes sur l\u2019\u00e9quation de Pell $$x^2-dy^2=\\pm 1$$ et leurs applications. Christiania Videnskabens Selskabs Skrifter, Math. Nat. Kl (2), 48 (1897)"},{"key":"8_CR30","unstructured":"The National Institute of Standards and Technology (NIST): Submission requirements and evaluation criteria for the post-quantum cryptography standardization process (2016)"},{"key":"8_CR31","unstructured":"The National Institute of Standards and Technology (NIST): Call for additional digital signature schemes for the post-quantum cryptography standardization process (2022)"},{"issue":"106","key":"8_CR32","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1090\/S0025-5718-1969-0247789-3","volume":"23","author":"J van de Lune","year":"1969","unstructured":"van de Lune, J., Wattel, E.: On the numerical solution of a differential-difference equation arising in analytic number theory. Math. Comput. 23(106), 417\u2013421 (1969)","journal-title":"Math. Comput."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-82852-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T13:02:20Z","timestamp":1741784540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-82852-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031828515","9783031828522"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-82852-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montreal, QC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 August 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC24\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}