{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:35:10Z","timestamp":1767321310081,"version":"3.48.0"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032105356","type":"print"},{"value":"9783032105363","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-10536-3_23","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:13Z","timestamp":1767321193000},"page":"616-644","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["PIsignHD: A New Structure for\u00a0the\u00a0SQIsign Family with\u00a0Flexible Applicability"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8577-2509","authenticated-orcid":false,"given":"Kaizhan","family":"Lin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-0516-1776","authenticated-orcid":false,"given":"Weize","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1792-0589","authenticated-orcid":false,"given":"Chang-An","family":"Zhao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2623-9170","authenticated-orcid":false,"given":"Yunlei","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"23_CR1","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/978-981-96-0891-1_11","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"A Basso","year":"2025","unstructured":"Basso, A., Dartois, P., Feo, L.D., Leroux, A., Maino, L., Pope, G., Robert, D., Wesolowski, B.: SQIsign2D-West. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 339\u2013370. Springer Nature Singapore, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-981-99-8742-9_7","volume-title":"Advances in Cryptology - ASIACRYPT 2023","author":"A Basso","year":"2023","unstructured":"Basso, A., Fouotsa, T.B.: New SIDH countermeasures for a more efficient key exchange. In: Guo, J., Steinfeld, R. (eds.) Advances in Cryptology - ASIACRYPT 2023, pp. 208\u2013233. Springer Nature Singapore, Singapore (2023). https:\/\/doi.org\/10.1007\/978-981-99-8742-9_7"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Bernstein, D.J., de Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. In: Galbraith, S. (ed.) ANTS-XIV - 14th Algorithmic Number Theory Symposium. Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), vol. 4, pp. 39\u201355. Mathematical Sciences Publishers, Auckland, New Zealand (2020)","DOI":"10.2140\/obs.2020.4.39"},{"key":"23_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1007\/978-3-030-34578-5_9","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2019","author":"W Beullens","year":"2019","unstructured":"Beullens, W., Kleinjung, T., Vercauteren, F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith, S.D., Moriai, S. (eds.) ASIACRYPT 2019. LNCS, vol. 11921, pp. 227\u2013247. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-34578-5_9"},{"issue":"1","key":"23_CR5","doi-asserted-by":"publisher","first-page":"9631360","DOI":"10.1049\/2024\/9631360","volume":"2024","author":"S Cai","year":"2024","unstructured":"Cai, S., Lin, K., Zhao, C.A.: Pairing optimizations for isogeny-based cryptosystems. IET Inf. Secur. 2024(1), 9631360 (2024). https:\/\/doi.org\/10.1049\/2024\/9631360","journal-title":"IET Inf. Secur."},{"key":"23_CR6","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Advances in Cryptology\u2013EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23-27 April 2023, Proceedings, Part V, pp. 423\u2013447. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"23_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/978-3-030-03332-3_15","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2018","author":"W Castryck","year":"2018","unstructured":"Castryck, W., Lange, T., Martindale, C., Panny, L., Renes, J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin, T., Galbraith, S. (eds.) ASIACRYPT 2018. LNCS, vol. 11274, pp. 395\u2013427. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-03332-3_15"},{"issue":"1","key":"23_CR8","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles, D.X., Lauter, K.E., Goren, E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009)","journal-title":"J. Cryptol."},{"key":"23_CR9","unstructured":"Chavez-Saab, J., et al.: SQIsign (2023). http:\/\/sqisign.org"},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-031-58716-0_3","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"M Corte-Real Santos","year":"2024","unstructured":"Corte-Real Santos, M., Eriksen, J.K., Meyer, M., Reijnders, K.: Apr\u00e8sSQI: extra fast verification for sqisign using extension-field signing. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 63\u201393. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_3"},{"key":"23_CR11","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQISignHD: New Dimensions in Cryptography. Cryptology ePrint Archive, Paper 2023\/436 (2023). https:\/\/eprint.iacr.org\/2023\/436"},{"key":"23_CR12","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-031-58716-0_1","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"P Dartois","year":"2024","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 3\u201332. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1"},{"key":"23_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1007\/978-3-030-17659-4_26","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2019","author":"L De Feo","year":"2019","unstructured":"De Feo, L., Galbraith, S.D.: SeaSign: compact isogeny signatures from class group actions. In: Ishai, Y., Rijmen, V. (eds.) EUROCRYPT 2019. LNCS, vol. 11478, pp. 759\u2013789. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-17659-4_26"},{"key":"23_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1007\/978-3-031-30589-4_23","volume-title":"Advances in Cryptology - EUROCRYPT 2023","author":"L De Feo","year":"2023","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New Algorithms for the Deuring Correspondence: Towards Practical and Secure SQISign Signatures. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology - EUROCRYPT 2023, pp. 659\u2013690. Springer Nature Switzerland, Cham (2023)"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"De\u00a0Feo, L., et alB.: S\u00e9ta: Supersingular Encryption from Torsion Attacks. In: Tibouchi, M., Wang, H. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2021, pp. 249\u2013278. Springer International Publishing, Cham (2021)","DOI":"10.1007\/978-3-030-92068-5_9"},{"key":"23_CR17","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1007\/978-981-96-0891-1_13","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"M Duparc","year":"2025","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: a dimension 2 variant of SQISignHD with non-smooth challenge isogenies. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 396\u2013429. Springer Nature Singapore, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_13"},{"key":"23_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-319-78372-7_11","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2018","author":"K Eisentr\u00e4ger","year":"2018","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Lauter, K., Morrison, T., Petit, C.: Supersingular isogeny graphs and endomorphism rings: reductions and solutions. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT 2018. LNCS, vol. 10822, pp. 329\u2013368. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_11"},{"key":"23_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-030-45388-6_6","volume-title":"Public-Key Cryptography \u2013 PKC 2020","author":"A El Kaafarani","year":"2020","unstructured":"El Kaafarani, A., Katsumata, S., Pintore, F.: Lossy CSI-FiSh: efficient signature scheme with tight reduction to decisional CSIDH-512. In: Kiayias, A., Kohlweiss, M., Wallden, P., Zikas, V. (eds.) PKC 2020. LNCS, vol. 12111, pp. 157\u2013186. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-45388-6_6"},{"key":"23_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/0-387-34805-0_24","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 89 Proceedings","author":"S Even","year":"1990","unstructured":"Even, S., Goldreich, O., Micali, S.: On-Line\/off-line digital signatures. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 263\u2013275. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_24"},{"key":"23_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/3-540-47721-7_12","volume-title":"Advances in Cryptology \u2014 CRYPTO\u2019 86","author":"A Fiat","year":"1987","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12"},{"key":"23_CR22","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1007\/978-3-031-30589-4_10","volume-title":"Advances in Cryptology - EUROCRYPT 2023","author":"TB Fouotsa","year":"2023","unstructured":"Fouotsa, T.B., Moriya, T., Petit, C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology - EUROCRYPT 2023, pp. 282\u2013309. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_10"},{"issue":"1","key":"23_CR23","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s00145-019-09316-0","volume":"33","author":"SD Galbraith","year":"2020","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. J. Cryptol. 33(1), 130\u2013175 (2020)","journal-title":"J. Cryptol."},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion $$\\ell $$-isogeny path problem. LMS J. Compu. Math. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"issue":"9","key":"23_CR25","doi-asserted-by":"publisher","first-page":"6679","DOI":"10.1109\/TIT.2024.3423675","volume":"70","author":"K Lin","year":"2024","unstructured":"Lin, K., Wang, W., Xu, Z., Zhao, C.A.: A faster software implementation of SQIsign. IEEE Trans. Inf. Theory 70(9), 6679\u20136689 (2024)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"3","key":"23_CR26","doi-asserted-by":"publisher","first-page":"445","DOI":"10.46586\/tches.v2023.i3.445-472","volume":"2023","author":"P Longa","year":"2023","unstructured":"Longa, P.: Efficient algorithms for large prime characteristic fields and their application to bilinear pairings. IACR Trans. Cryptographic Hardware Embedded Syst. 2023(3), 445\u2013472 (2023)","journal-title":"IACR Trans. Cryptographic Hardware Embedded Syst."},{"key":"23_CR27","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Advances in Cryptology\u2013EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23-27 April 2023, Proceedings, Part V, pp. 448\u2013471. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"23_CR28","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-981-96-0891-1_9","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"K Nakagawa","year":"2025","unstructured":"Nakagawa, K., et al.: SQIsign2D-East: a new signature scheme Using 2-dimensional isogenies. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 272\u2013303. Springer Nature Singapore, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9"},{"key":"23_CR29","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-981-96-0891-1_8","volume-title":"Advances in Cryptology - ASIACRYPT 2024","author":"H Onuki","year":"2025","unstructured":"Onuki, H., Nakagawa, K.: Ideal-to-isogeny algorithm using 2-dimensional isogenies and its application to SQIsign. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology - ASIACRYPT 2024, pp. 243\u2013271. Springer Nature Singapore, Singapore (2025). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_8"},{"key":"23_CR30","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-031-58751-1_14","volume-title":"Advances in Cryptology - EUROCRYPT 2024","author":"A Page","year":"2024","unstructured":"Page, A., Wesolowski, B.: The supersingular endomorphism ring and one endomorphism problems are equivalent. In: Joye, M., Leander, G. (eds.) Advances in Cryptology - EUROCRYPT 2024, pp. 388\u2013417. Springer Nature Switzerland, Cham (2024)"},{"issue":"1","key":"23_CR31","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1090\/S0273-0979-1990-15918-X","volume":"23","author":"AK Pizer","year":"1990","unstructured":"Pizer, A.K.: Ramanujan graphs and Hecke operators. Bull. Am. Math. Soc. 23(1), 127\u2013137 (1990)","journal-title":"Bull. Am. Math. Soc."},{"key":"23_CR32","unstructured":"Renan, F., Kutas, P.: SQIAsignHD: SQIsignHD Adaptor Signature. Cryptology ePrint Archive, Paper 2024\/561 (2024). https:\/\/eprint.iacr.org\/2024\/561"},{"key":"23_CR33","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Advances in Cryptology\u2013EUROCRYPT 2023: 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, 23-27 April 2023, Proceedings, Part V, pp. 472\u2013503. Springer (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"23_CR34","unstructured":"Robert, D.: Fast pairings via biextensions and cubical arithmetic. Cryptology ePrint Archive, Paper 2024\/517 (2024). https:\/\/eprint.iacr.org\/2024\/517"},{"key":"23_CR35","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, 2nd Edition. Graduate Texts in Mathematics. Springer (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"23_CR36","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. C. R. Acad. Sci., Paris, S\u00e9r. A 273, 238\u2013241 (1971)"},{"key":"23_CR37","doi-asserted-by":"crossref","unstructured":"Voight, J.: Quaternion algebras. Springer Graduate Texts in Mathematics series. (2021)","DOI":"10.1007\/978-3-030-56694-4"},{"issue":"2","key":"23_CR38","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1109\/TIFS.2012.2232653","volume":"8","author":"ACC Yao","year":"2013","unstructured":"Yao, A.C.C., Zhao, Y.: Online\/offline signatures for low-power devices. IEEE Trans. Inf. Forensics Secur. 8(2), 283\u2013294 (2013)","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Lecture Notes in Computer Science","Selected Areas in Cryptography \u2013 SAC 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-10536-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T02:33:14Z","timestamp":1767321194000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-10536-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032105356","9783032105363"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-10536-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SAC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Selected Areas in Cryptography","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toronto, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sacworkshop.org\/SAC25\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}