{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T14:17:22Z","timestamp":1772893042311,"version":"3.50.1"},"publisher-location":"Cham","reference-count":43,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031866012","type":"print"},{"value":"9783031866029","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86602-9_1","type":"book-chapter","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:55:05Z","timestamp":1742860505000},"page":"3-37","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Efficient Theta-Based Algorithms for\u00a0Computing $$(\\ell , \\ell )$$-Isogenies on\u00a0Kummer Surfaces for\u00a0Arbitrary Odd $$\\ell $$"],"prefix":"10.1007","author":[{"given":"Ryo","family":"Yoshizumi","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Onuki","sequence":"additional","affiliation":[]},{"given":"Ryo","family":"Ohashi","sequence":"additional","affiliation":[]},{"given":"Momonari","family":"Kudo","sequence":"additional","affiliation":[]},{"given":"Koji","family":"Nuida","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,15]]},"reference":[{"issue":"11","key":"1_CR1","doi-asserted-by":"publisher","first-page":"2829","DOI":"10.1109\/TC.2013.145","volume":"63","author":"G Adj","year":"2014","unstructured":"Adj, G., Rodr\u00edguez-Henr\u00edquez, F.: Square root computation over even extension fields. IEEE Trans. Comput. 63(11), 2829\u20132841 (2014). https:\/\/doi.org\/10.1109\/TC.2013.145","journal-title":"IEEE Trans. Comput."},{"key":"1_CR2","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: Fast Encryption from Supersingular Torsion Attacks. In: ASIACRYPT 2023, Part VII. LNCS. vol. 14444, pp. 98\u2013126. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"1_CR3","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., De\u00a0Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. In: ANTS XIV\u2014Proceedings of the Fourteenth Algorithmic Number Theory Symposium. Open Book Ser., Berkeley, CA, vol.\u00a04, pp. 39\u201355. Math. Sci. Publ. (2020). https:\/\/doi.org\/10.2140\/obs.2020.4.39","DOI":"10.2140\/obs.2020.4.39"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Birkenhake, C., Lange, H.: Complex abelian varieties, Grundlehren der mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], vol.\u00a0302. Springer-Verlag, Berlin, second edn. (2004). https:\/\/doi.org\/10.1007\/978-3-662-06307-1","DOI":"10.1007\/978-3-662-06307-1"},{"key":"1_CR5","unstructured":"Bisson, G., Cosset, R., Robert, D.: AVIsogenies v0.7 (Abelian Varieties and Isogenies), Magma package for explicit isogenies between abelian varieties (2021). https:\/\/www.math.u-bordeaux.fr\/~damienrobert\/avisogenies\/"},{"issue":"3","key":"1_CR6","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1006\/jsco.1996.0125","volume":"24","author":"W Bosma","year":"1997","unstructured":"Bosma, W., Cannon, J., Playoust, C.: The magma algebra system I: the user language. J. Symb. Comput. 24(3), 235\u2013265 (1997). https:\/\/doi.org\/10.1006\/jsco.1996.0125","journal-title":"J. Symb. Comput."},{"key":"1_CR7","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An Efficient Key Recovery Attack on SIDH. In: EUROCRYPT 2023, Part V. LNCS. vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-030-03332-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"W Castryck","year":"2018","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15"},{"key":"1_CR9","doi-asserted-by":"publisher","unstructured":"Chen, M., Leroux, A., Panny, L.: SCALLOP-HD: group action from 2-dimensional isogenies. In: Public-Key Cryptography \u2013 PKC 2024, pp. 190\u2013216. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57725-3_7","DOI":"10.1007\/978-3-031-57725-3_7"},{"key":"1_CR10","unstructured":"Chi-Dom\u00ednguez, J.J., Pizarro-Madariaga, A., Riquelme, E.: Computing Isogenies of Power-Smooth Degrees Between PPAVs. Cryptology ePrint Archive, Paper 2023\/508 (2023). https:\/\/eprint.iacr.org\/2023\/508"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Corte-Real Santos, M., Costello, C., Smith, B.: Efficient (3,3)-isogenies on fast Kummer surfaces. Cryptology ePrint Archive, Paper 2024\/144 (2024). https:\/\/eprint.iacr.org\/2024\/144","DOI":"10.1007\/s40993-024-00600-y"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Corte-Real Santos, M., Flynn, E.V.: Isogenies on Kummer Surfaces (2024). https:\/\/arxiv.org\/abs\/2409.14819","DOI":"10.1090\/mcom\/4036"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Cosset, R., Robert, D.: Computing $$(\\ell ,\\ell )$$-isogenies in polynomial time on Jacobians of genus 2 curves. Mathematics of Computation 84(294), 1953\u20131975 (2015). http:\/\/www.jstor.org\/stable\/24489183","DOI":"10.1090\/S0025-5718-2014-02899-8"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/978-3-030-64834-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"C Costello","year":"2020","unstructured":"Costello, C.: B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12492, pp. 440\u2013463. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_15"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-319-70697-9_11","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"C Costello","year":"2017","unstructured":"Costello, C., Hisil, H.: A simple and compact algorithm for SIDH with arbitrary degree isogenies. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10625, pp. 303\u2013329. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_11"},{"key":"1_CR16","doi-asserted-by":"publisher","unstructured":"Cox, D.A.: Primes of the form $$x^2 + ny^2$$. A Wiley-Interscience Publication. Wiley, New York (1989). https:\/\/doi.org\/10.1002\/9781118400722","DOI":"10.1002\/9781118400722"},{"key":"1_CR17","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: EUROCRYPT 2024, Part I. LNCS. vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"1_CR18","doi-asserted-by":"publisher","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An Algorithmic Approach to $$(2,2)$$-isogenies in the theta model and applications to isogeny-based cryptography. In: Advances in Cryptology \u2013 ASIACRYPT 2024. pp. 304\u2013338. Springer, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_10","DOI":"10.1007\/978-981-96-0891-1_10"},{"key":"1_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"1_CR20","doi-asserted-by":"publisher","unstructured":"De\u00a0Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the deuring correspondence. In: EUROCRYPT 2023, Part V. LNCS. vol. 14008, pp. 659\u2013690. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"1_CR21","doi-asserted-by":"publisher","unstructured":"Jao, D., De\u00a0Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Post-Quantum Cryptography, pp. 19\u201334. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"1_CR22","doi-asserted-by":"publisher","unstructured":"Jao, D., Laflamme, J.: Isogeny interpolation and the computation of isogenies from higher dimensional representations. In: Progress in Cryptology \u2013 INDOCRYPT 2024, pp. 159\u2013179. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-80311-6_8","DOI":"10.1007\/978-3-031-80311-6_8"},{"key":"1_CR23","doi-asserted-by":"publisher","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. J. Reine Angew. Math. 485, 93\u2013121 (1997). https:\/\/doi.org\/10.1515\/crll.1997.485.93","DOI":"10.1515\/crll.1997.485.93"},{"key":"1_CR24","doi-asserted-by":"crossref","unstructured":"Koizumi, S.: Theta relations and projective normality of abelian varieties. Am. J. Math. 98(4), 865\u2013889 (1976). http:\/\/www.jstor.org\/stable\/2374034","DOI":"10.2307\/2374034"},{"key":"1_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/978-3-642-14518-6_21","volume-title":"Algorithmic Number Theory","author":"D Lubicz","year":"2010","unstructured":"Lubicz, D., Robert, D.: Efficient pairing computation with theta functions. In: Hanrot, G., Morain, F., Thom\u00e9, E. (eds.) ANTS 2010. LNCS, vol. 6197, pp. 251\u2013269. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14518-6_21"},{"key":"1_CR26","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Computing isogenies between abelian varieties. Compos. Math. 148(5), 1483\u20131515 (2012). https:\/\/doi.org\/10.1112\/S0010437X12000243","DOI":"10.1112\/S0010437X12000243"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: A generalisation of Miller\u2019s algorithm and applications to pairing computations on abelian varieties. J. Symbolic Comput. 67, 68\u201392 (2015). https:\/\/doi.org\/10.1016\/j.jsc.2014.08.001","DOI":"10.1016\/j.jsc.2014.08.001"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Arithmetic on abelian and Kummer varieties. Finite Fields Appl. 39, 130\u2013158 (2016). https:\/\/doi.org\/10.1016\/j.ffa.2016.01.009","DOI":"10.1016\/j.ffa.2016.01.009"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Lubicz, D., Robert, D.: Fast change of level and applications to isogenies. Res. Number Theory 9(1), 7, 28 (2023). https:\/\/doi.org\/10.1007\/s40993-022-00407-9","DOI":"10.1007\/s40993-022-00407-9"},{"key":"1_CR30","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: EUROCRYPT 2023, Part V. LNCS. vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"1_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/978-3-030-05378-9_8","volume-title":"Progress in Cryptology \u2013 INDOCRYPT 2018","author":"M Meyer","year":"2018","unstructured":"Meyer, M., Reith, S.: A faster way to the CSIDH. In: Chakraborty, D., Iwata, T. (eds.) INDOCRYPT 2018. LNCS, vol. 11356, pp. 137\u2013152. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05378-9_8"},{"key":"1_CR32","doi-asserted-by":"crossref","unstructured":"Montgomery, P.L.: Speeding the Pollard and elliptic curve methods of factorization. Math. Comput. 48, 243\u2013264 (1987). https:\/\/api.semanticscholar.org\/CorpusID:4262792","DOI":"10.1090\/S0025-5718-1987-0866113-7"},{"key":"1_CR33","doi-asserted-by":"publisher","unstructured":"Mumford, D.: On the equations defining abelian varieties. I. Inventiones mathematicae 1(4), 287\u2013354 (1966). https:\/\/doi.org\/10.1007\/BF01389737","DOI":"10.1007\/BF01389737"},{"key":"1_CR34","unstructured":"Mumford, D.: Abelian Varieties Tata Institute of Fundamental Research (1970). https:\/\/api.semanticscholar.org\/CorpusID:115766011"},{"key":"1_CR35","unstructured":"Mumford, D.: Tata lectures on theta. II, Progress in Mathematics, vol.\u00a043. Birkh\u00e4user Boston, Inc., Boston (1984). https:\/\/doi.org\/10.1007\/978-0-8176-4578-6, jacobian theta functions and differential equations, With the collaboration of C. Musili, M. Nori, E. Previato, M.\u00a0Stillman and H. Umemura"},{"key":"1_CR36","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras. In: CRYPTO 2024, Part V. LNCS, vol. 14924, pp. 75\u2013106. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"1_CR37","unstructured":"Robert, D.: Efficient algorithms for abelian varieties and their moduli spaces. Habilitation \u00e0 diriger des recherches, Universit\u00e9 de Bordeaux (UB) (2021). https:\/\/hal.science\/tel-03498268"},{"key":"1_CR38","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: EUROCRYPT 2023, Part V. LNCS. vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"1_CR39","unstructured":"Scott, M.: A note on the calculation of some functions in finite fields: tricks of the Trade. Cryptology ePrint Archive, Paper 2020\/1497 (2020). https:\/\/eprint.iacr.org\/2020\/1497"},{"key":"1_CR40","unstructured":"Stange, K.E.: Elliptic Nets and Elliptic Curves. Ph.D. thesis, Brown University (2008)"},{"key":"1_CR41","unstructured":"The Sage Developers: SageMath, the Sage Mathematics Software System (Version 10.3) (2024). https:\/\/www.sagemath.org"},{"key":"1_CR42","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. C. R. Acad. Sci. Paris S\u00e9r. A-B 273, A238\u2013A241 (1971)"},{"key":"1_CR43","unstructured":"Yoshizumi, R., Onuki, H., Ohashi, R., Kudo, M., Nuida, K.: Efficient theta-based algorithms for computing $$(\\ell , \\ell )$$-isogenies on Kummer surfaces for arbitrary odd $$\\ell $$. Cryptology ePrint Archive, Paper 2024\/1519 (2024). https:\/\/eprint.iacr.org\/2024\/1519"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86602-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:55:32Z","timestamp":1742860532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86602-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031866012","9783031866029"],"references-count":43,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86602-9_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2025.iis.sinica.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}