{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T04:15:02Z","timestamp":1742876102411,"version":"3.40.2"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031866012","type":"print"},{"value":"9783031866029","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-86602-9_2","type":"book-chapter","created":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:48:04Z","timestamp":1742860084000},"page":"38-60","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Commuting Ramanujan Graphs and\u00a0the\u00a0Random Self-reducibility of\u00a0Isogeny Problems"],"prefix":"10.1007","author":[{"given":"Youcef","family":"Mokrani","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8073-1692","authenticated-orcid":false,"given":"David","family":"Jao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,15]]},"reference":[{"key":"2_CR1","volume-title":"Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables","author":"M Abramowitz","year":"1964","unstructured":"Abramowitz, M., Stegun, I.A.: Handbook of Mathematical Functions with Formulas, Graphs, and Mathematical Tables, 10th edn. Dover, New York (1964)","edition":"10"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Arpin, S.: Adding level structure to supersingular elliptic curve isogeny graphs. arXiv preprint arXiv:2203.03531 (2024)","DOI":"10.5802\/jtnb.1283"},{"key":"2_CR3","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-3-031-30617-4_14","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., et al.: Supersingular curves you can trust. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 405\u2013437. Springer, Cham (2023)"},{"key":"2_CR4","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-981-96-0891-1_11","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"A Basso","year":"2025","unstructured":"Basso, A., et al.: SQIsign2d-west. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT 2024, pp. 339\u2013370. Springer, Singapore (2025)"},{"key":"2_CR5","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-981-99-8742-9_7","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Fouotsa, T.B.: New SIDH countermeasures for a more efficient key exchange. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023, pp. 208\u2013233. Springer, Singapore (2023)"},{"key":"2_CR6","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-981-99-8739-9_4","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023, pp. 98\u2013126. Springer, Singapore (2023)"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-031-30589-4_15","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 423\u2013447. Springer, Cham (2023)"},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-981-99-8739-9_5","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Vercauteren, F.: A polynomial time attack on instances of M-SIDH and FESTA. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023, pp. 127\u2013156. Springer, Singapore (2023)"},{"key":"2_CR9","unstructured":"Codogni, G., Lido, G.: Spectral theory of isogeny graphs. arXiv preprint arXiv:2308.13913 (2024)"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"De\u00a0Feo, L., Dobson, S., Galbraith, S.D., Zobernig, L.: SIDH proof of knowledge. In: Advances in Cryptology - ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part II, pp. 310\u2013339. Springer-Verlag, Berlin, Heidelberg (2023). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_11","DOI":"10.1007\/978-3-031-22966-4_11"},{"key":"2_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/978-3-031-58754-2_7","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2024","author":"L De Feo","year":"2024","unstructured":"De Feo, L., Fouotsa, T.B., Panny, L.: Isogeny problems with level structure. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024, pp. 181\u2013204. Springer, Cham (2024)"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-031-30589-4_10","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"TB Fouotsa","year":"2023","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 282\u2013309. Springer, Cham (2023)"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Han, J.: The general linear group over a ring. Bull. Korean Math. Soc. 43 (2006). https:\/\/doi.org\/10.4134\/BKMS.2006.43.3.619","DOI":"10.4134\/BKMS.2006.43.3.619"},{"key":"2_CR14","unstructured":"Horn, R., Johnson, C.: Matrix Analysis. Cambridge University Press (2012). https:\/\/books.google.ca\/books?id=O7sgAwAAQBAJ"},{"key":"2_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-642-25405-5_2","volume-title":"Post-Quantum Cryptography","author":"D Jao","year":"2011","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.Y. (ed.) Post-Quantum Cryptography, pp. 19\u201334. Springer, Berlin, Heidelberg (2011)"},{"issue":"6","key":"2_CR16","doi-asserted-by":"publisher","first-page":"1491","DOI":"10.1016\/j.jnt.2008.11.006","volume":"129","author":"D Jao","year":"2009","unstructured":"Jao, D., Miller, S.D., Venkatesan, R.: Expander graphs based on GRH with an application to elliptic curve cryptography. J. Number Theor. 129(6), 1491\u20131504 (2009). https:\/\/doi.org\/10.1016\/j.jnt.2008.11.006","journal-title":"J. Number Theor."},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-030-68890-5_4","volume-title":"Information Security and Cryptology \u2013 ICISC 2020","author":"T Kawashima","year":"2021","unstructured":"Kawashima, T., Takashima, K., Aikawa, Y., Takagi, T.: An efficient authenticated key exchange from random self-reducibility on CSIDH. In: Hong, D. (ed.) ICISC 2020. LNCS, vol. 12593, pp. 58\u201384. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-68890-5_4"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-031-30589-4_16","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"L Maino","year":"2023","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 448\u2013471. Springer, Cham (2023)"},{"key":"2_CR19","unstructured":"Mestre, J.F.: La m\u00e9thode des graphes. Exemples et applications. In: Proceedings of the International Conference on Class Numbers and Fundamental Units of Algebraic Number Fields, pp. 217\u2013242 (1986)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/978-3-319-70697-9_12","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"C Petit","year":"2017","unstructured":"Petit, C.: Faster algorithms for isogeny problems using torsion point images. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017. LNCS, vol. 10625, pp. 330\u2013353. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70697-9_12"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Pizer, A.K.: Ramanujan graphs and Hecke operators. Bull. New Ser. Am. Math. Soc. 23(1), 127\u2013137 (1990). https:\/\/doi.org\/bams\/1183555725","DOI":"10.1090\/S0273-0979-1990-15918-X"},{"key":"2_CR22","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-031-30589-4_17","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2023","author":"D Robert","year":"2023","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 472\u2013503. Springer, Cham (2023)"},{"key":"2_CR23","unstructured":"Robert, D.: On the efficient representation of isogenies (a survey). Cryptology ePrint Archive, Paper 2024\/1071 (2024). https:\/\/eprint.iacr.org\/2024\/1071"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1007\/s00493-017-3605-0","volume":"39","author":"NT Sardari","year":"2015","unstructured":"Sardari, N.T.: Diameter of Ramanujan graphs and random Cayley graphs. Combinatorica 39, 427\u2013446 (2015)","journal-title":"Combinatorica"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. In: Graduate Texts in Mathematics. Springer, Dordrecht (2009). https:\/\/doi.org\/10.1007\/978-0-387-09494-6","DOI":"10.1007\/978-0-387-09494-6"}],"container-title":["Lecture Notes in Computer Science","Post-Quantum Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-86602-9_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T23:48:15Z","timestamp":1742860095000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-86602-9_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031866012","9783031866029"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-86602-9_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PQCrypto","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Post-Quantum Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pqcrypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pqcrypto2025.iis.sinica.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}