{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T07:41:43Z","timestamp":1777534903447,"version":"3.51.4"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032067531","type":"print"},{"value":"9783032067548","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T00:00:00Z","timestamp":1759363200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-06754-8_7","type":"book-chapter","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:01Z","timestamp":1759307041000},"page":"174-208","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Improved Algorithms for\u00a0Ascending Isogeny Volcanoes, and\u00a0Applications"],"prefix":"10.1007","author":[{"given":"Steven D.","family":"Galbraith","sequence":"first","affiliation":[]},{"given":"Valerie","family":"Gilchrist","sequence":"additional","affiliation":[]},{"given":"Damien","family":"Robert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,2]]},"reference":[{"key":"7_CR1","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-031-91826-1_11","volume-title":"PKC 2025","author":"B Allombert","year":"2025","unstructured":"Allombert, B., et al.: Faster SCALLOP from non-prime conductor suborders in medium sized quadratic fields. In: Jager, T., Pan, J. (eds.) PKC 2025. LNCS, vol. 15676, pp. 333\u2013363. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91826-1_11"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., De Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. MSP Open Book Series (2020)","DOI":"10.2140\/obs.2020.4.39"},{"key":"7_CR3","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/978-3-031-30589-4_15","volume-title":"EUROCRYPT 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15"},{"key":"7_CR4","unstructured":"Castryck, W., et al.: Isogeny interpolation for elliptic curves, and applications. Presented by Wouter Castryck at the Sixteenth Algorithmic Number Theory Symposium, Massachusetts Institute of Technology, 15 July 2024. https:\/\/antsmath.org\/ANTSXVI\/schedule.html"},{"key":"7_CR5","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"762","DOI":"10.1007\/978-3-031-38548-3_25","volume-title":"CRYPTO 2023","author":"W Castryck","year":"2023","unstructured":"Castryck, W., Houben, M., Merz, S.P., Mula, M., Buuren, S., Vercauteren, F.: Weak instances of class group action based cryptography via self-pairings. In: Handschuh, H., Lysyanskaya, A. (eds.) CRYPTO 2023. LNCS, vol. 14083, pp. 762\u2013792. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_25"},{"issue":"4","key":"7_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s40993-022-00399-6","volume":"8","author":"W Castryck","year":"2022","unstructured":"Castryck, W., Houben, M., Vercauteren, F., Wesolowski, B.: On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves. Res. Number Theory 8(4), 99 (2022)","journal-title":"Res. Number Theory"},{"key":"7_CR7","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/978-3-031-57725-3_7","volume-title":"PKC 2024","author":"M Chen","year":"2024","unstructured":"Chen, M., Leroux, A., Panny, L.: SCALLOP-HD: group action from 2-dimensional isogenies. In: Tang, Q., Teague, V. (eds.) PKC 2024. LNCS, vol. 14603, pp. 190\u2013216. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-57725-3_7"},{"issue":"1","key":"7_CR8","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1515\/jmc-2019-0034","volume":"14","author":"L Col\u00f2","year":"2020","unstructured":"Col\u00f2, L., Kohel, D.: Orienting supersingular isogeny graphs. J. Math. Cryptol. 14(1), 414\u2013437 (2020)","journal-title":"J. Math. Cryptol."},{"key":"7_CR9","unstructured":"Cox, D.A.: Primes of the Form $$x^2 + n y^2$$: Fermat, Class Field Theory, and Complex Multiplication. AMS Chelsea Publishing\/American Mathematical Society, 3rd edn. (2022)"},{"key":"7_CR10","unstructured":"Edixhoven, B., van\u00a0der Geer, G., Moonen, B.: Abelian varieties. Book project (2012). http:\/\/van-der-geer.nl\/~gerard\/AV.pdf"},{"key":"7_CR11","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-031-31368-4_13","volume-title":"PKC 2023","author":"LD Feo","year":"2023","unstructured":"Feo, L.D., et al.: SCALLOP: scaling the CSI-FiSh. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC 2023. LNCS, vol. 13940, pp. 345\u2013375. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-31368-4_13"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1016\/j.ffa.2017.09.006","volume":"49","author":"M Fouquet","year":"2018","unstructured":"Fouquet, M., Miret, J.M., Valera, J.: Distorting the volcano. Finite Fields Appl. 49, 108\u2013125 (2018)","journal-title":"Finite Fields Appl."},{"key":"7_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1112\/S1461157000000097","volume":"2","author":"SD Galbraith","year":"1999","unstructured":"Galbraith, S.D.: Constructing isogenies between elliptic curves over finite fields. LMS J. Comput. Math. 2, 118\u2013138 (1999)","journal-title":"LMS J. Comput. Math."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D.: Climbing and descending tall isogeny volcanos. Res. Number Theory 11(7) (2025)","DOI":"10.1007\/s40993-024-00586-7"},{"key":"7_CR15","unstructured":"Hardy, G.H., Wright, E.M.: An Introduction to the Theory of Numbers, 5th edn. Oxford (1979)"},{"issue":"281","key":"7_CR16","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1090\/S0025-5718-2012-02622-6","volume":"82","author":"S Ionica","year":"2013","unstructured":"Ionica, S., Joux, A.: Pairing the volcano. Math. Comput. 82(281), 581\u2013603 (2013)","journal-title":"Math. Comput."},{"issue":"5","key":"7_CR17","doi-asserted-by":"publisher","first-page":"934","DOI":"10.1112\/S0010437X17007990","volume":"154","author":"BW Jordan","year":"2018","unstructured":"Jordan, B.W., Keeton, A.G., Poonen, B., Rains, E.M., Shepherd-Barron, N., Tate, J.T.: Abelian varieties isogenous to a power of an elliptic curve. Compositio Mathematica 154(5), 934\u2013959 (2018)","journal-title":"Compositio Mathematica"},{"key":"7_CR18","first-page":"1997","volume":"122\u201393","author":"E Kani","year":"1997","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. Journal f\u00fcr die reine und angewandte Mathematik (Crelles Journal) 122\u201393, 1997 (1997)","journal-title":"Journal f\u00fcr die reine und angewandte Mathematik (Crelles Journal)"},{"key":"7_CR19","unstructured":"Kohel, D.R.: Endomorphism rings of elliptic curves over finite fields. Ph.D. thesis, University of California, Berkeley (1996)"},{"key":"7_CR20","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1007\/978-981-96-0891-1_12","volume-title":"ASIACRYPT 2024","author":"J Macula","year":"2025","unstructured":"Macula, J., Stange, K.E.: Extending class group action attacks via sesquilinear pairings. In: Chung, K.M., Sasaki, Y. (eds.) ASIACRYPT 2024. LNCS, vol. 15486, pp. 371\u2013395. Springer, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_12"},{"key":"7_CR21","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"448","DOI":"10.1007\/978-3-031-30589-4_16","volume-title":"EUROCRYPT 2023","author":"L Maino","year":"2023","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16"},{"issue":"2","key":"7_CR22","first-page":"739","volume":"176","author":"JM Miret","year":"2006","unstructured":"Miret, J.M., Moreno, R., Sadornil, D., Tena, J., Valls, M.: An algorithm to compute volcanoes of 2-isogenies of elliptic curves over finite fields. Appl. Math. Comput. 176(2), 739\u2013750 (2006)","journal-title":"Appl. Math. Comput."},{"key":"7_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ffa.2020.101777","volume":"69","author":"H Onuki","year":"2021","unstructured":"Onuki, H.: On oriented supersingular elliptic curves. Finite Fields Their Appl. 69, 101777 (2021)","journal-title":"Finite Fields Their Appl."},{"key":"7_CR24","unstructured":"Pornin, T.: Optimized discrete logarithm computation for faster square roots in finite fields. Cryptology ePrint Archive, Paper 2023\/828 (2023)"},{"key":"7_CR25","unstructured":"Robert, D.: Some applications of higher dimensional isogenies to elliptic curves (preliminary version). IACR Cryptology ePrint Archive, p. 1704 (2022)"},{"key":"7_CR26","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"472","DOI":"10.1007\/978-3-031-30589-4_17","volume-title":"EUROCRYPT 2023","author":"D Robert","year":"2023","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17"},{"key":"7_CR27","unstructured":"Robert, D.: The module action for isogeny based cryptography. IACR Eprint 2024\/1556, October 2024"},{"key":"7_CR28","unstructured":"Robert, D.: On the efficient representation of isogenies (a survey). IACR Eprint 2024\/1071, June 2024"},{"key":"7_CR29","unstructured":"Stange, K.E.: Sesquilinear pairings on elliptic curves. arXiv preprint arXiv:2405.14167 (2024)"},{"key":"7_CR30","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/BF01404549","volume":"2","author":"J Tate","year":"1966","unstructured":"Tate, J.: Endomorphisms of abelian varieties over finite fields. Invent. Math. 2, 134\u2013144 (1966)","journal-title":"Invent. Math."}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 LATINCRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-06754-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T08:24:13Z","timestamp":1759307053000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-06754-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,2]]},"ISBN":["9783032067531","9783032067548"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-06754-8_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,2]]},"assertion":[{"value":"2 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"LATINCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology and Information Security in Latin America","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Medell\u00edn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Colombia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"latincrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ciencias.medellin.unal.edu.co\/eventos\/latincrypt\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}