{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:34:44Z","timestamp":1775774084720,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032018540","type":"print"},{"value":"9783032018557","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-032-01855-7_6","type":"book-chapter","created":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T19:41:25Z","timestamp":1755373285000},"page":"167-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["$$\\text {KLPT}^2$$: Algebraic Pathfinding in\u00a0Dimension Two and\u00a0Applications"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0191-5216","authenticated-orcid":false,"given":"Wouter","family":"Castryck","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0253-4180","authenticated-orcid":false,"given":"Thomas","family":"Decru","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2043-9542","authenticated-orcid":false,"given":"P\u00e9ter","family":"Kutas","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1185-8959","authenticated-orcid":false,"given":"Abel","family":"Laval","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3482-6743","authenticated-orcid":false,"given":"Christophe","family":"Petit","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1851-921X","authenticated-orcid":false,"given":"Yan Bo","family":"Ti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,17]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Basso, A., et al.: SQIsign2D-west: the fast, the small, and the safer. In: Chung, KM., Sasaki, Y. (eds.) ASIACRYPT 2024, Part III. LNCS, vol. 15486, pp. 339\u2013370. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Booher, J., et al.: Failing to hash into supersingular isogeny graphs. Comput. J. 67(8), 2702\u20132719 (2024). https:\/\/doi.org\/10.1093\/comjnl\/bxae038","DOI":"10.1093\/comjnl\/bxae038"},{"key":"6_CR3","series-title":"Association for Women in Mathematics Series","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-319-17987-2_5","volume-title":"Women in Numbers Europe","author":"I Bouw","year":"2015","unstructured":"Bouw, I., et al.: Bad reduction of genus three curves with complex multiplication. In: Bertin, M.J., Bucur, A., Feigon, B., Schneps, L. (eds.) Women in Numbers Europe. AWMS, vol. 2, pp. 109\u2013151. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17987-2_5"},{"key":"6_CR4","unstructured":"Brock, B.: Superspecial curves of genera two and three. Ph.D. thesis, Princeton University (1994)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, Part V. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T., Kutas, P., Laval, A., Petit, C., Ti, Y.B.: KLPT$$ ^2$$: algebraic pathfinding in dimension two and applications. Cryptology ePrint Archive, Paper 2025\/372, 2025. Full version of this paper. https:\/\/eprint.iacr.org\/2025\/372","DOI":"10.1007\/978-3-032-01855-7_6"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Castryck, W., Decru, T., Smith, B.: Hash functions from superspecial genus-2 curves using Richelot isogenies. J. Math. Cryptol. 14(1), 268\u2013292 (2020). https:\/\/doi.org\/10.1515\/jmc-2019-0021","DOI":"10.1515\/jmc-2019-0021"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009). https:\/\/doi.org\/10.1007\/s00145-007-9002-x","DOI":"10.1007\/s00145-007-9002-x"},{"key":"6_CR9","unstructured":"Chavez-Saab, J., et al.: SQIsign: algorithm specifications and supporting documentation, v1.0. https:\/\/sqisign.org\/"},{"key":"6_CR10","doi-asserted-by":"publisher","unstructured":"Chen, M., Imran, M., Ivanyos, G., Kutas, P., Leroux, A., Petit, C.: Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT 2023, Part III. LNCS, vol. 14440, pp. 99\u2013130. Springer, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8727-6_4","DOI":"10.1007\/978-981-99-8727-6_4"},{"key":"6_CR11","unstructured":"Chu, H.-W.: Algorithms for abelian surfaces over finite fields and their applications to cryptography. Ph.D. thesis, Pennsylvania State University (2021). https:\/\/etda.libraries.psu.edu\/files\/final_submissions\/24383"},{"key":"6_CR12","unstructured":"Conrad, B.: Polarizations. Notes of the VIGRE Number Theory Working Group (2004). https:\/\/math.stanford.edu\/~conrad\/vigregroup\/vigre04\/polarization.pdf"},{"key":"6_CR13","doi-asserted-by":"publisher","unstructured":"Santos, M.C.-R., Costello, C., Smith, B.: Efficient $$(3,3)$$-isogenies on fast Kummer surfaces. Res. Num. Theor. 11 (2025). Article no. 25. https:\/\/doi.org\/10.1007\/s40993-024-00600-y","DOI":"10.1007\/s40993-024-00600-y"},{"key":"6_CR14","unstructured":"Cosset, R.: Applications des fonctions th\u00eata \u00e0 la cryptographie sur courbes hyperelliptiques. Ph.D. thesis, Universit\u00e9 Henri Poincar\u00e9 Nancy (2011). https:\/\/theses.hal.science\/tel-00642951v1"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Cosset, R., Robert, D.: Computing $$(\\ell ,\\ell )$$-isogenies in polynomial time on Jacobians of genus 2 curves. Math. Comput. 84(294), 1953\u20131975 (2015). http:\/\/www.jstor.org\/stable\/24489183","DOI":"10.1090\/S0025-5718-2014-02899-8"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Couveignes, J.-M., Ezome, T.: Computing functions on Jacobians and their quotients. LMS J. Comput. Math. 18(1), 555\u2013577 (2015). https:\/\/doi.org\/10.1112\/S1461157015000169","DOI":"10.1112\/S1461157015000169"},{"key":"6_CR17","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) EUROCRYPT 2024, Part I. LNCS, vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"6_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020, Part I. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die Typen der Multiplikatorenringe Elliptischer Funktionenk\u00f6rper. Abhandlungen aus dem mathematischen Seminar der Universit\u00e4t Hamburg 14, 197\u2013272 (1941)","DOI":"10.1007\/BF02940746"},{"key":"6_CR20","doi-asserted-by":"publisher","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: a dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: Chung, KM., Sasaki, Y. (eds.) ASIACRYPT 2024, Part III. LNCS, vol. 15486, pp. 396\u2013429. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13","DOI":"10.1007\/978-981-96-0891-1_13"},{"key":"6_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-78372-7_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"K Eisentr\u00e4ger","year":"2018","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Lauter, K., Morrison, T., Petit, C.: Supersingular isogeny graphs and endomorphism rings: reductions and solutions. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 329\u2013368. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_11"},{"key":"6_CR22","doi-asserted-by":"publisher","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Leonardi, C., Morrison, T., Park, J.: Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs. Open Book Ser. 4, 215\u2013232 (2020). https:\/\/doi.org\/10.2140\/obs.2020.4.215","DOI":"10.2140\/obs.2020.4.215"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Eriksen, J.K., Panny, L., Sot\u00e1kov\u00e1, J., Veroni, M.: Deuring for the people: supersingular elliptic curves with prescribed endomorphism ring in general characteristic. In: LuCaNT: LMFDB, Computation, and Number Theory, Contemporary Mathematics, pp. 339\u2013365 (2023). https:\/\/doi.org\/10.1090\/conm\/796\/16008","DOI":"10.1090\/conm\/796\/16008"},{"key":"6_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1007\/978-3-030-25510-7_16","volume-title":"Post-Quantum Cryptography","author":"EV Flynn","year":"2019","unstructured":"Flynn, E.V., Ti, Y.B.: Genus two isogeny cryptography. In: Ding, J., Steinwandt, R. (eds.) PQCrypto 2019. LNCS, vol. 11505, pp. 286\u2013306. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-25510-7_16"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-70694-8_1","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2017","author":"SD Galbraith","year":"2017","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT 2017, Part I. LNCS, vol. 10624, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1"},{"key":"6_CR26","unstructured":"Gaudry, P., Soumier, J., Spaenlehauer, P.-J.: Isogeny-based cryptography using isomorphisms of superspecial abelian surfaces. Cryptology ePrint Archive, Paper 2025\/136 (2025). https:\/\/eprint.iacr.org\/2025\/136"},{"key":"6_CR27","doi-asserted-by":"publisher","unstructured":"G\u00e9lin, A., Howe, E., Ritzenthaler, C.: Principally polarized squares of elliptic curves with field of moduli equal to $$\\mathbb{Q}$$. Open Book Ser. 2(1), 257\u2013274 (2019). https:\/\/doi.org\/10.2140\/obs.2019.2.257","DOI":"10.2140\/obs.2019.2.257"},{"key":"6_CR28","doi-asserted-by":"publisher","unstructured":"Howe, E.W., Lepr\u00e9vost, F., Poonen, B.: Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum 12(3), 315\u2013364 (2000). https:\/\/doi.org\/10.1515\/form.2000.008","DOI":"10.1515\/form.2000.008"},{"key":"6_CR29","unstructured":"Ibukiyama, T., Katsura, T., Oort, F.: Supersingular curves of genus two and class numbers. Compositio Mathematica 57(2), 127\u2013152 (1986). http:\/\/eudml.org\/doc\/89752"},{"key":"6_CR30","unstructured":"Jordan, B.W., Zaytman, Y.: Isogeny graphs of superspecial abelian varieties and Brandt matrices. Mathematische Zeitschrift (2024, to appear). https:\/\/arxiv.org\/pdf\/2005.09031.pdf"},{"key":"6_CR31","doi-asserted-by":"publisher","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. J. f\u00fcr die reine und angewandte Mathematik 485, 93\u2013121 (1997). https:\/\/doi.org\/10.1515\/crll.1997.485.93","DOI":"10.1515\/crll.1997.485.93"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Kani, E.: The moduli spaces of Jacobians isomorphic to a product of two elliptic curves. Collectanea Mathematica 67, 21\u201354 (2015). https:\/\/doi.org\/10.1007\/s13348-015-0148-9","DOI":"10.1007\/s13348-015-0148-9"},{"key":"6_CR33","doi-asserted-by":"publisher","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.-P.: On the quaternion isogeny path problem. LMS J. Comput. Math. 17(A), 418\u2013432 (2014). https:\/\/doi.org\/10.1112\/S1461157014000151","DOI":"10.1112\/S1461157014000151"},{"key":"6_CR34","doi-asserted-by":"publisher","unstructured":"Kunzweiler, S., et al.: Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3. In: Jager, T., Pan, J. (eds.) PKC 2025, Part III. LNCS, vol. 15676, pp. 265\u2013299. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91826-1_9","DOI":"10.1007\/978-3-031-91826-1_9"},{"key":"6_CR35","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, Part V. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"6_CR36","unstructured":"Milne, J.: Abelian varieties, version 2.0 (2008). Course notes available at https:\/\/www.jmilne.org\/math\/CourseNotes\/av.html"},{"key":"6_CR37","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., et al.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. In: Chung, KM., Sasaki, Y. (eds.) ASIACRYPT 2024, Part III. LNCS, vol. 15486, pp. 272\u2013303. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"6_CR38","unstructured":"Petit, C., Smith, S.: An improvement to the quaternion analogue of the $$\\ell $$-isogeny problem. Presentation at MathCrypt (2018)"},{"key":"6_CR39","doi-asserted-by":"crossref","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, Part V. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"6_CR40","doi-asserted-by":"publisher","unstructured":"Robert, D.: On the efficient representation of isogenies: a survey for NuTMiC 2024. In: D\u00e7browski, A., Pieprzyk, J., Pomyka\u0142a, J. (eds.) NuTMiC 2024. LNCS, vol. 14966, pp. 3\u201384 (2025). https:\/\/doi.org\/10.1007\/978-3-031-82380-0_1","DOI":"10.1007\/978-3-031-82380-0_1"},{"key":"6_CR41","series-title":"Lecture Notes in Mathematics","doi-asserted-by":"publisher","first-page":"564","DOI":"10.1007\/BFb0066664","volume-title":"Algebraic Geometry","author":"T Shioda","year":"1979","unstructured":"Shioda, T.: Supersingular K3 surfaces. In: L\u00f8nsted, K. (ed.) Algebraic Geometry. LNM, vol. 732, pp. 564\u2013591. Springer, Heidelberg (1979). https:\/\/doi.org\/10.1007\/BFb0066664"},{"key":"6_CR42","unstructured":"Smith, B.: Explicit endomorphisms and correspondences. Ph.D. thesis, University of Sydney (2005). https:\/\/www.academia.edu\/77805612\/Explicit_endomorphisms_and_Correspondences"},{"key":"6_CR43","series-title":"Mathematics for Industry","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/978-981-10-5065-7_6","volume-title":"Mathematical Modelling for Next-Generation Cryptography","author":"K Takashima","year":"2018","unstructured":"Takashima, K.: Efficient algorithms for isogeny sequences and their cryptographic applications. In: Takagi, T., Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., Duong, D.H. (eds.) Mathematical Modelling for Next-Generation Cryptography. MI, vol. 29, pp. 97\u2013114. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-5065-7_6"},{"key":"6_CR44","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56694-4","volume-title":"Quaternion Algebras","author":"J Voight","year":"2021","unstructured":"Voight, J.: Quaternion Algebras. GTM, vol. 288. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-56694-4"},{"key":"6_CR45","doi-asserted-by":"publisher","unstructured":"Wesolowski, B.: The supersingular isogeny path and endomorphism ring problems are equivalent. In: 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pp. 1100\u20131111. IEEE (2022). https:\/\/doi.org\/10.1109\/FOCS52979.2021.00109","DOI":"10.1109\/FOCS52979.2021.00109"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 CRYPTO 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-01855-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T19:21:54Z","timestamp":1768850514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-01855-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783032018540","9783032018557"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-01855-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"17 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CRYPTO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual International Cryptology Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santa Barbara, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"45","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"crypto2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/crypto.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}