{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:34:32Z","timestamp":1775774072429,"version":"3.50.1"},"publisher-location":"Cham","reference-count":67,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032018540","type":"print"},{"value":"9783032018557","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-01855-7_5","type":"book-chapter","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T19:41:26Z","timestamp":1755373286000},"page":"131-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["More Efficient Isogeny Proofs of\u00a0Knowledge via\u00a0Canonical Modular Polynomials"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-2097-4117","authenticated-orcid":false,"given":"Thomas","family":"den Hollander","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6794-8061","authenticated-orcid":false,"given":"S\u00f6ren","family":"Kleine","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5953-8724","authenticated-orcid":false,"given":"Marzio","family":"Mula","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4181-2561","authenticated-orcid":false,"given":"Daniel","family":"Slamanig","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5421-3143","authenticated-orcid":false,"given":"Sebastian A.","family":"Spindler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Abdolmaleki, B., Glaeser, N., Ramacher, S., Slamanig, D.: Circuit-succinct universally composable NIZKs with updatable CRS. In: 2024 IEEE 37th Computer Security Foundations Symposium (CSF), pp. 527\u2013542. IEEE Computer Society, Los Alamitos, CA, USA, July 2024. https:\/\/doi.org\/10.1109\/CSF61375.2024.00006","DOI":"10.1109\/CSF61375.2024.00006"},{"key":"5_CR2","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/J.FFA.2018.10.002","volume":"55","author":"G Adj","year":"2019","unstructured":"Adj, G., Ahmadi, O., Menezes, A.: On isogeny graphs of supersingular elliptic curves over finite fields. Finite Fields App. 55, 268\u2013283 (2019). https:\/\/doi.org\/10.1016\/J.FFA.2018.10.002","journal-title":"Finite Fields App."},{"key":"5_CR3","doi-asserted-by":"publisher","unstructured":"Ames, S., Hazay, C., Ishai, Y., Venkitasubramaniam, M.: Ligero: lightweight sublinear arguments without a trusted setup. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017: 24th Conference on Computer and Communications Security, pp. 2087\u20132104. ACM Press, Dallas, TX, USA, October 31\u2013November 2, 2017. https:\/\/doi.org\/10.1145\/3133956.3134104","DOI":"10.1145\/3133956.3134104"},{"key":"5_CR4","doi-asserted-by":"publisher","unstructured":"Atapoor, S., Baghery, K., Cozzo, D., Pedersen, R.: Practical robust DKG protocols for CSIDH. In: Tibouchi, M., Wang, X. (eds.) ACNS 23: 21st International Conference on Applied Cryptography and Network Security, Part\u00a0II. LNCS, vol. 13906, pp. 219\u2013247. Springer, Cham, Switzerland, Kyoto, Japan (2023). https:\/\/doi.org\/10.1007\/978-3-031-33491-7_9","DOI":"10.1007\/978-3-031-33491-7_9"},{"key":"5_CR5","doi-asserted-by":"publisher","unstructured":"Atapoor, S., Baghery, K., Cozzo, D., Pedersen, R.: VSS from distributed ZK proofs and applications. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02023, Part\u00a0I. LNCS, vol. 14438, pp. 405\u2013440. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8721-4_13","DOI":"10.1007\/978-981-99-8721-4_13"},{"issue":"2","key":"5_CR6","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1006\/jnth.2001.2760","volume":"95","author":"R Auer","year":"2002","unstructured":"Auer, R., Top, J.: Legendre elliptic curves over finite fields. J. Number Theory 95(2), 303\u2013312 (2002). https:\/\/doi.org\/10.1006\/jnth.2001.2760","journal-title":"J. Number Theory"},{"key":"5_CR7","series-title":"Association for Women in Mathematics Series","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-030-19478-9_2","volume-title":"Research Directions in Number Theory","author":"E Bank","year":"2019","unstructured":"Bank, E., Camacho-Navarro, C., Eisentr\u00e4ger, K., Morrison, T., Park, J.: Cycles in the supersingular l-isogeny graph and corresponding endomorphisms. In: Balakrishnan, J.S., Folsom, A., Lal\u00edn, M., Manes, M. (eds.) Research Directions in Number Theory. AWMS, vol. 19, pp. 41\u201366. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-19478-9_2"},{"key":"5_CR8","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-031-91124-8_4","volume-title":"EUROCRYPT 2025, Part II","author":"A Basso","year":"2025","unstructured":"Basso, A., Maino, L.: POK\u00c9: A compact and efficient PKE from higher-dimensional isogenies. In: Fehr, S., Fouque, P.-A. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2025, Part II. Lecture Notes in Computer Science, vol. 15602, pp. 94\u2013123. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91124-8_4"},{"key":"5_CR9","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: Supersingular curves you can trust. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0II. Lecture Notes in Computer Science, vol. 14005, pp. 405\u2013437. Springer, Cham, Switzerland, Lyon, France (2023). https:\/\/doi.org\/10.1007\/978-3-031-30617-4_14","DOI":"10.1007\/978-3-031-30617-4_14"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.P.: Aurora: Transparent succinct arguments for R1CS. In: Ishai, Y., Rijmen, V. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02019, Part\u00a0I. LNCS, vol. 11476, pp. 103\u2013128. Springer, Cham, Switzerland, Darmstadt, Germany (2019). https:\/\/doi.org\/10.1007\/978-3-030-17653-2_4","DOI":"10.1007\/978-3-030-17653-2_4"},{"issue":"11","key":"5_CR11","doi-asserted-by":"publisher","first-page":"3425","DOI":"10.1007\/S10623-023-01243-3","volume":"91","author":"W Beullens","year":"2023","unstructured":"Beullens, W., De Feo, L., Galbraith, S.D., Petit, C.: Proving knowledge of isogenies: a survey. Des. Codes Cryptogr. 91(11), 3425\u20133456 (2023). https:\/\/doi.org\/10.1007\/S10623-023-01243-3","journal-title":"Des. Codes Cryptogr."},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02019, Part\u00a0I. LNCS, vol. 11921, pp. 227\u2013247. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Beullens, W., Seiler, G.: LaBRADOR: Compact proofs for R1CS from module-SIS. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02023, Part\u00a0V. LNCS, vol. 14085, pp. 518\u2013548. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38554-4_17","DOI":"10.1007\/978-3-031-38554-4_17"},{"key":"5_CR14","doi-asserted-by":"publisher","unstructured":"Boneh, D., Bonneau, J., B\u00fcnz, B., Fisch, B.: Verifiable delay functions. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02018, Part\u00a0I. LNCS, vol. 10991, pp. 757\u2013788. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96884-1_25","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"5_CR15","doi-asserted-by":"publisher","unstructured":"Burdges, J., De Feo, L.: Delay encryption. In: Canteaut, A., Standaert, F.X. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02021, Part\u00a0I. LNCS, vol. 12696, pp. 302\u2013326. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_11","DOI":"10.1007\/978-3-030-77870-5_11"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02018, Part\u00a0III. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham, Switzerland, Brisbane, Queensland, Australia (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"5_CR17","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22, 93\u2013113 (2009)","journal-title":"J. Cryptol."},{"key":"5_CR18","doi-asserted-by":"publisher","unstructured":"Ch\u00e1vez-Saab, J., Rodr\u00edguez-Henr\u00edquez, F., Tibouchi, M.: Verifiable isogeny walks: towards an isogeny-based postquantum VDF. In: AlTawy, R., H\u00fclsing, A. (eds.) SAC 2021: 28th Annual International Workshop on Selected Areas in Cryptography. LNCS, vol. 13203, pp. 441\u2013460. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-99277-4_21","DOI":"10.1007\/978-3-030-99277-4_21"},{"key":"5_CR19","unstructured":"Codogni, G., Lido, G.: Spectral theory of isogeny graphs. arXiV:2308.13913v3 [math.NT], July 2024"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Cohen, H., Frey, G., Avanzi, R.M., Doche, C., Lange, T., Nguyen, K., Vercauteren, F.: Handbook of elliptic and hyperelliptic curve cryptography. Discrete Math. Appl. (Boca Raton), Chapman & Hall\/CRC, Boca Raton, FL (2006). https:\/\/doi.org\/10.1201\/9781420034981","DOI":"10.1201\/9781420034981"},{"key":"5_CR21","doi-asserted-by":"publisher","unstructured":"Cong, K., Lai, Y.F., Levin, S.: Efficient isogeny proofs using generic techniques. In: Tibouchi, M., Wang, X. (eds.) ACNS 23: 21st International Conference on Applied Cryptography and Network Security, Part\u00a0II. LNCS, vol. 13906, pp. 248\u2013275. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33491-7_10","DOI":"10.1007\/978-3-031-33491-7_10"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Cooper, D., Santesson, S., Farrell, S., Boeyen, S., Housley, R., Polk, W.: Internet x.509 public key infrastructure certificate and certificate revocation list (CRL) profile. RFC\u00a05280, RFC Editor, May 2008. http:\/\/www.rfc-editor.org\/rfc\/rfc5280.txt","DOI":"10.17487\/rfc5280"},{"key":"5_CR23","unstructured":"Costache, A., Feigon, B., Lauter, K., Massierer, M., Pusk\u00e1s, A.: Ramanujan graphs in cryptography. In: Balakrishnan, J.S., Folsom, A., Lal\u00edn, M., Manes, M. (eds.)"},{"key":"5_CR24","unstructured":"Couveignes, J.M.: Hard homogeneous spaces. Cryptology ePrint Archive, Paper 2006\/291 (2006), https:\/\/eprint.iacr.org\/2006\/291"},{"key":"5_CR25","unstructured":"Cox, D.A.: Primes of the Form $$x^{2} + ny^{2}$$. Fermat, Class Field Theory, and Complex Multiplication. Pure and Applied Mathematics: A Wiley Series of Texts, Monographs and Tracts, John Wiley & Sons, 2nd edn. (2013)"},{"key":"5_CR26","unstructured":"Cremona, J., Watkins, M.: Computing isogenies of elliptic curves (2005). http:\/\/magma.maths.usyd.edu.au\/users\/watkins\/papers\/isogs.ps"},{"key":"5_CR27","doi-asserted-by":"publisher","unstructured":"De Feo, L., Dobson, S., Galbraith, S.D., Zobernig, L.: SIDH proof of knowledge. In: Agrawal, S., Lin, D. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02022, Part\u00a0II. LNCS, vol. 13792, pp. 310\u2013339. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22966-4_11","DOI":"10.1007\/978-3-031-22966-4_11"},{"issue":"3","key":"5_CR28","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/JMC-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo, L., Jao, D., Pl\u00fbt, J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014). https:\/\/doi.org\/10.1515\/JMC-2012-0015","journal-title":"J. Math. Cryptol."},{"key":"5_CR29","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02020, Part\u00a0I. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"5_CR30","doi-asserted-by":"publisher","unstructured":"De Feo, L., Masson, S., Petit, C., Sanso, A.: Verifiable delay functions from supersingular isogenies and pairings. In: Galbraith, S.D., Moriai, S. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02019, Part\u00a0I. LNCS, vol. 11921, pp. 248\u2013277. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_10","DOI":"10.1007\/978-3-030-34578-5_10"},{"key":"5_CR31","doi-asserted-by":"publisher","unstructured":"Delpech de Saint Guilhem, C., Orsini, E., Tanguy, T.: Limbo: efficient zero-knowledge MPCitH-based arguments. In: Vigna, G., Shi, E. (eds.) ACM CCS 2021: 28th Conference on Computer and Communications Security, pp. 3022\u20133036. ACM Press, Virtual Event, Republic of Korea (2021). https:\/\/doi.org\/10.1145\/3460120.3484595","DOI":"10.1145\/3460120.3484595"},{"key":"5_CR32","unstructured":"den\u00a0Hollander, T., Kleine, S., Mula, M., Slamanig, D., Spindler, S.A.: More efficient isogeny proofs of knowledge via canonical modular polynomials. Cryptology ePrint Archive, Paper 2024\/1738 (2024). https:\/\/eprint.iacr.org\/2024\/1738"},{"key":"5_CR33","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1007\/978-3-031-82852-2_7","volume-title":"SAC 2024","author":"M Duparc","year":"2024","unstructured":"Duparc, M., Fouotsa, T.B., Vaudenay, S.: SILBE: An updatable public key encryption scheme from lollipop attacks. In: Eichlseder, M., Gambs, S. (eds.) SAC 2024: 31st Annual International Workshop on Selected Areas in Cryptography, Part I. Lecture Notes in Computer Science, vol. 15516, pp. 151\u2013177. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-82852-2_7"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Elkies, N.D.: Elliptic and modular curves over finite fields and related computational issues. In: Buell, D.A., Teitelbaum, J.T. (eds.) Computational Perspectives on Number Theory, Studies in Advanced Mathematics, vol.\u00a07, pp. 21\u201376. American Mathematical Society (AMS) (1998)","DOI":"10.1090\/amsip\/007\/03"},{"key":"5_CR35","doi-asserted-by":"publisher","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 282\u2013309. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_10","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"5_CR36","doi-asserted-by":"publisher","unstructured":"Fricke, R.: Die elliptischen Funktionen und ihre Anwendungen: Zweiter Teil: Die algebraischen Ausf\u00fchrungen. Life Science and Basic Disciplines (German Language), Springer Berlin, Heidelberg, 1st edn. (2011). https:\/\/doi.org\/10.1007\/978-3-642-19561-7. (originally published by B.G. Teubner-Verlag (1922))","DOI":"10.1007\/978-3-642-19561-7"},{"key":"5_CR37","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT\u00a02017, Part\u00a0I. LNCS, vol. 10624, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"5_CR38","doi-asserted-by":"publisher","unstructured":"Golovnev, A., Lee, J., Setty, S.T.V., Thaler, J., Wahby, R.S.: Brakedown: linear-time and field-agnostic SNARKs for R1CS. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02023, Part\u00a0II. LNCS, vol. 14082, pp. 193\u2013226. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38545-2_7","DOI":"10.1007\/978-3-031-38545-2_7"},{"key":"5_CR39","doi-asserted-by":"crossref","unstructured":"Gow, R.: Some properties and uses of the discriminant of a polynomial. In: Ryan, R., Hurley, T., Rippon, P. (eds.) Irish Mathematical Society Bulletin. vol.\u00a024, pp. 12\u201319. Irish Mathematical Society (1990)","DOI":"10.33232\/BIMS.0024.12.19"},{"key":"5_CR40","doi-asserted-by":"publisher","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments. In: Fischlin, M., Coron, J.S. (eds.) Advances in Cryptology \u2013 EUROCRYPT\u00a02016, Part\u00a0II. LNCS, vol.\u00a09666, pp. 305\u2013326. Springer, Berlin (2016). https:\/\/doi.org\/10.1007\/978-3-662-49896-5_11","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"5_CR41","doi-asserted-by":"publisher","unstructured":"Groth, J., Kohlweiss, M., Maller, M., Meiklejohn, S., Miers, I.: Updatable and universal common reference strings with applications to zk-SNARKs. In: Shacham, H., Boldyreva, A. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02018, Part\u00a0III. LNCS, vol. 10993, pp. 698\u2013728. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96878-0_24","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"5_CR42","doi-asserted-by":"publisher","unstructured":"G\u00fcneysu, T., Hodges, P.W., Land, G., Ounsworth, M., Stebila, D., Zaverucha, G.: Proof-of-possession for KEM certificates using verifiable generation. In: Yin, H., Stavrou, A., Cremers, C., Shi, E. (eds.) ACM CCS 2022: 29th Conference on Computer and Communications Security, pp. 1337\u20131351. ACM Press (2022). https:\/\/doi.org\/10.1145\/3548606.3560560","DOI":"10.1145\/3548606.3560560"},{"key":"5_CR43","doi-asserted-by":"publisher","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.Y. (ed.) Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, pp. 19\u201334. Springer, Berlin, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2","DOI":"10.1007\/978-3-642-25405-5_2"},{"issue":"4","key":"5_CR44","first-page":"849","volume":"26","author":"M Kaneko","year":"1989","unstructured":"Kaneko, M.: Supersingular $$j$$-invariants as singular moduli mod $$p$$. Osaka J. Math. 26(4), 849\u2013855 (1989)","journal-title":"Osaka J. Math."},{"key":"5_CR45","unstructured":"Kohel, D.: Endomorphism rings of elliptic curves over finite fields. Ph.D. thesis, University of California, Berkeley (1996). https:\/\/www.i2m.univ-amu.fr\/perso\/david.kohel\/pub\/thesis.pdf"},{"key":"5_CR46","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4752-4","volume-title":"Elliptic Functions, Graduate Texts in Mathematics","author":"S Lang","year":"1987","unstructured":"Lang, S.: Elliptic Functions, Graduate Texts in Mathematics, vol. 112. Springer, New York, NY (1987). https:\/\/doi.org\/10.1007\/978-1-4612-4752-4"},{"key":"5_CR47","unstructured":"Lercier, R.: Algorithmique des courbes elliptiques dans les corps finis. Ph.D. thesis, Ecole Polytechnique, June 1997. https:\/\/univ-rennes.hal.science\/tel-01101949"},{"key":"5_CR48","unstructured":"Levin, S., Pedersen, R.: Faster proofs and VRFs from isogenies. Cryptology ePrint Archive, Paper 2024\/1626 (2024). https:\/\/eprint.iacr.org\/2024\/1626"},{"key":"5_CR49","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2019.101600","volume":"61","author":"S Li","year":"2020","unstructured":"Li, S., Ouyang, Y., Xu, Z.: Neighborhood of the supersingular elliptic curve isogeny graph at $$j=0$$ and $$1728$$. Finite Fields Appl. 61, 101600 (2020). https:\/\/doi.org\/10.1016\/j.ffa.2019.101600","journal-title":"Finite Fields Appl."},{"key":"5_CR50","doi-asserted-by":"publisher","unstructured":"Lipmaa, H.: A unified framework for non-universal SNARKs. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) PKC\u00a02022: 25th International Conference on Theory and Practice of Public Key Cryptography, Part\u00a0I. LNCS, vol. 13177, pp. 553\u2013583. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97121-2_20","DOI":"10.1007\/978-3-030-97121-2_20"},{"key":"5_CR51","doi-asserted-by":"crossref","unstructured":"Love, J., Boneh, D.: Supersingular curves with small noninteger endomorphisms. In: ANTS XIV: Proceedings of the Fourteenth Algorithmic Number Theory Symposium. Open Book Series, vol.\u00a04, pp. 7\u201322. Mathematical Sciences Publishers (2020). https:\/\/msp.org\/obs\/2020\/4-1\/obs-v4-n1-p.pdf","DOI":"10.2140\/obs.2020.4.7"},{"key":"5_CR52","unstructured":"Mestre, J.F.: La m\u00e9thode des graphes. exemples et applications. In: Proceedings of the international conference on class numbers and fundamental units of algebraic number fields (Katata), pp. 217\u2013242 (1986). https:\/\/wstein.org\/papers\/rank4\/mestre-en.pdf. (english version (tr. Andrei Jorza))"},{"key":"5_CR53","doi-asserted-by":"crossref","unstructured":"Morain, F.: Calcul du nombre de points sur une courbe elliptique dans un corps fini: aspects algorithmiques. Journal de Th\u00e9orie des Nombres de Bordeaux 7(1), 255\u2013282 (1995). http:\/\/www.jstor.org\/stable\/43972443","DOI":"10.5802\/jtnb.143"},{"key":"5_CR54","unstructured":"Moriya, T.: IS-CUBE: An isogeny-based compact KEM using a boxed SIDH diagram. Cryptology ePrint Archive, Paper 2023\/1506 (2023). https:\/\/eprint.iacr.org\/2023\/1506"},{"key":"5_CR55","unstructured":"M\u00fcller, V.: Ein Algorithmus zur Bestimmung der Punktanzahl elliptischer Kurven \u00fcber endlichen K\u00f6rpern der Charakteristik gr\u00f6\u00dfer drei. Ph.D. thesis, Universit\u00e4t des Saarlandes (1995). https:\/\/publikationen.sulb.uni-saarland.de\/handle\/20.500.11880\/25777"},{"key":"5_CR56","doi-asserted-by":"publisher","unstructured":"Nguyen, N.K., Seiler, G.: Practical sublinear proofs for R1CS from lattices. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02022, Part\u00a0II. LNCS, vol. 13508, pp. 133\u2013162. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15979-4_5","DOI":"10.1007\/978-3-031-15979-4_5"},{"issue":"1","key":"5_CR57","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1090\/S0273-0979-1990-15918-X","volume":"23","author":"AK Pizer","year":"1990","unstructured":"Pizer, A.K.: Ramanujan graphs and Hecke operators. Bull. Am. Math. Soc. New Ser. 23(1), 127\u2013137 (1990). https:\/\/doi.org\/10.1090\/S0273-0979-1990-15918-X","journal-title":"Bull. Am. Math. Soc. New Ser."},{"key":"5_CR58","doi-asserted-by":"publisher","unstructured":"Ristenpart, T., Yilek, S.: The power of proofs-of-possession: securing multiparty signatures against rogue-key attacks. In: Naor, M. (ed.) Advances in Cryptology \u2013 EUROCRYPT\u00a02007. LNCS, vol.\u00a04515, pp. 228\u2013245. Springer, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-72540-4_13","DOI":"10.1007\/978-3-540-72540-4_13"},{"key":"5_CR59","unstructured":"Rostovtsev, A., Stolbunov, A.: Public-key cryptosystem based on isogenies. Cryptology ePrint Archive, Paper 2006\/145 (2006). https:\/\/eprint.iacr.org\/2006\/145"},{"key":"5_CR60","doi-asserted-by":"publisher","unstructured":"Schwabe, P., Stebila, D., Wiggers, T.: Post-quantum TLS without handshake signatures. In: Ligatti, J., Ou, X., Katz, J., Vigna, G. (eds.) ACM CCS 2020: 27th Conference on Computer and Communications Security, pp. 1461\u20131480. ACM Press, Virtual Event, USA (2020). https:\/\/doi.org\/10.1145\/3372297.3423350","DOI":"10.1145\/3372297.3423350"},{"key":"5_CR61","doi-asserted-by":"publisher","unstructured":"Silverman, J.H.: The arithmetic of elliptic curves, Grad. Texts in Mathematics, vol. 106. Springer New York, NY, 2nd edn. (2009). https:\/\/doi.org\/10.1007\/978-0-387-09494-6","DOI":"10.1007\/978-0-387-09494-6"},{"key":"5_CR62","doi-asserted-by":"publisher","unstructured":"Sutherland, A.V.: Isogeny volcanoes. In: Howe, E.W., Kedlaya, K.S. (eds.) ANTS X. Proceedings of the Tenth Algorithmic Number Theory Symposium. The Open Book Series, vol.\u00a01, pp. 507\u2013530. Mathematical Sciences Publishers, November 2013. https:\/\/doi.org\/10.2140\/obs.2013.1.507","DOI":"10.2140\/obs.2013.1.507"},{"issue":"2\u20134","key":"5_CR63","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1561\/3300000030","volume":"4","author":"J Thaler","year":"2022","unstructured":"Thaler, J.: Proofs, arguments, and zero-knowledge. Found. Trends Priv. Secur. 4(2\u20134), 117\u2013660 (2022). https:\/\/doi.org\/10.1561\/3300000030","journal-title":"Found. Trends Priv. Secur."},{"key":"5_CR64","unstructured":"Tsukazaki, K.: Explicit isogenies of elliptic curves. Ph.D. thesis, University of Warwick, July 2013. http:\/\/webcat.warwick.ac.uk\/record=b2688905~S1"},{"key":"5_CR65","volume-title":"Elliptic Curves. Number Theory and Cryptography","author":"LC Washington","year":"2008","unstructured":"Washington, L.C.: Elliptic Curves. Number Theory and Cryptography, 2nd edn. Chapman and Hall\/CRC, Boca Raton (2008)","edition":"2"},{"key":"5_CR66","doi-asserted-by":"publisher","unstructured":"Xie, T., Zhang, J., Zhang, Y., Papamanthou, C., Song, D.: Libra: succinct zero-knowledge proofs with optimal prover computation. In: Boldyreva, A., Micciancio, D. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02019, Part\u00a0III. LNCS, vol. 11694, pp. 733\u2013764. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-26954-8_24","DOI":"10.1007\/978-3-030-26954-8_24"},{"key":"5_CR67","doi-asserted-by":"publisher","unstructured":"Xie, T., Zhang, Y., Song, D.: Orion: zero knowledge proof with linear prover time. In: Dodis, Y., Shrimpton, T. (eds.) Advances in Cryptology \u2013 CRYPTO\u00a02022, Part\u00a0IV. LNCS, vol. 13510, pp. 299\u2013328. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-15985-5_11","DOI":"10.1007\/978-3-031-15985-5_11"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01855-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T19:21:47Z","timestamp":1768850507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01855-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032018540","9783032018557"],"references-count":67,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01855-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}