{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:49:21Z","timestamp":1743011361364,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811668890"},{"type":"electronic","value":"9789811668906"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-16-6890-6_72","type":"book-chapter","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:02:28Z","timestamp":1646488948000},"page":"953-966","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation Report of\u00a0the\u00a0Kohel\u2013Lauter\u2013Petit\u2013Tignol Algorithm for\u00a0the\u00a0Constructive Deuring Correspondence"],"prefix":"10.1007","author":[{"given":"Yuta","family":"Kambe","sequence":"first","affiliation":[]},{"given":"Yusuke","family":"Aikawa","sequence":"additional","affiliation":[]},{"given":"Momonari","family":"Kudo","sequence":"additional","affiliation":[]},{"given":"Masaya","family":"Yasuda","sequence":"additional","affiliation":[]},{"given":"Katsuyuki","family":"Takashima","sequence":"additional","affiliation":[]},{"given":"Kazuhiro","family":"Yokoyama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,6]]},"reference":[{"issue":"1","key":"72_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF02579403","volume":"6","author":"L Babai","year":"1986","unstructured":"Babai L (1986) On Lov\u00e1sz\u2019 lattice reduction and the nearest lattice point problem. Combinatorica 6(1):1\u201313","journal-title":"Combinatorica"},{"issue":"1","key":"72_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"D Charles","year":"2009","unstructured":"Charles D, Lauter K, Goren E (2009) Cryptographic hash functions from expander graphs. J Cryptol 22(1):93\u2013113","journal-title":"J Cryptol"},{"key":"72_CR3","first-page":"33","volume":"46","author":"G Cornacchia","year":"1903","unstructured":"Cornacchia G (1903) Su di un metodo per la risoluzione in numeri interi dell\u2019 equazione $$\\sum _{h=0}^n c_h x^{n-h} y^h = p$$. Giornale di Mathematiche di Battaglini 46:33\u201390","journal-title":"Giornale di Mathematiche di Battaglini"},{"key":"72_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/BF02940746","volume":"14","author":"M Deuring","year":"1941","unstructured":"Deuring M (1941) Die Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper. Abhandlungen aus dem Mathematischen Seminar der Universit\u00e4t Hamburg 14:197\u2013272","journal-title":"Abhandlungen aus dem Mathematischen Seminar der Universit\u00e4t Hamburg"},{"key":"72_CR5","doi-asserted-by":"crossref","unstructured":"De Feo L, Kohel D, Leroux A, Petit C, Wesolowski B (2020) SQISign: Compact post-quantum signatures from quaternions and isogenies. In: Advances in Cryptology\u2013ASIACRYPT 2020 (To appear). https:\/\/eprint.iacr.org\/2020\/1240.pdf","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"72_CR6","doi-asserted-by":"crossref","unstructured":"Eisentr\u00e4ger K, Hallgren S, Lauter K, Morrison T, Petit C (2018) Supersingular isogeny graphs and endomorphism rings: Reductions and solutions. In: Advances in Cryptology\u2013EUROCRYPT 2018, LNCS, vol 10822. Springer, pp 329\u2013368","DOI":"10.1007\/978-3-319-78372-7_11"},{"key":"72_CR7","doi-asserted-by":"crossref","unstructured":"Jao D, De Feo L (2011) Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: International Workshop on Post-Quantum Cryptography (PQCrypto 2011), LNCS, vol 7071. Springer, pp 19\u201334","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"72_CR8","unstructured":"Jao D et\u00a0al (2021) SIKE: Supersingular Isogeny Key Encapsulation, Submission to the NIST standardization process on post-quantum cryptography. https:\/\/sike.org\/"},{"key":"72_CR9","unstructured":"Kohel D (1996) Endomorphism rings of elliptic curves over finite fields, PhD thesis, University of California, Berkeley"},{"key":"72_CR10","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1112\/S1461157014000151","volume":"17A","author":"D Kohel","year":"2014","unstructured":"Kohel D, Lauter K, Petit C, Tignol J-P (2014) On the quaternion $$\\ell $$-isogeny path problem. LMS J Comput Math 17A:418\u2013432","journal-title":"LMS J Comput Math"},{"key":"72_CR11","doi-asserted-by":"crossref","unstructured":"Galbraith SD, Petit C, Shani B, Ti YB (2016) On the security of super singular isogeny crytosystems. In: Advances in cryptology\u2013ASIACRYPT 2016, LNCS, vol 10031. Springer, pp 63\u201391","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"72_CR12","doi-asserted-by":"crossref","unstructured":"Galbraith SD, Petit C, Silva J (2017) Identification protocols and signature schemes based on super singular isogeny problems. In: Advances in cryptology\u2013ASIACRYPT 2017, LNCS, vol 10624. Springer, pp 3\u201333","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"72_CR13","doi-asserted-by":"crossref","unstructured":"Moody D et\u00a0al (2021) NISTIR 8309: status report on the second round of the NIST post-quantum cryptography standardization process. https:\/\/nvlpubs.nist.gov\/nistpubs\/ir\/2020\/NIST.IR.8309.pdf","DOI":"10.6028\/NIST.IR.8309"},{"key":"72_CR14","unstructured":"Petit C, Smith S (2018) An improvement to the quaternion analogue of the $$\\ell $$-isogeny problem (slides) presented at MathCrypt"},{"key":"72_CR15","unstructured":"Ray D (2018) Constructing the Deuring correspondence with applications to super singular isogeny-based cryptography, Master Thesis, Eindhoven University of Technology"},{"key":"72_CR16","doi-asserted-by":"crossref","unstructured":"Silverman JH (2009) The arithmetic of elliptic curves, 2nd edn. Springer GTM 106,","DOI":"10.1007\/978-0-387-09494-6"},{"key":"72_CR17","unstructured":"The National Institute of Standards and Technology (NIST) (2021) Post-quantum cryptography. https:\/\/csrc.nist.gov\/projects\/post-quantum-cryptography"},{"key":"72_CR18","unstructured":"The Sage Developers, SageMath, the Sage Mathematics Software System (Version 9.0). https:\/\/www.sagemath.org\/"},{"key":"72_CR19","doi-asserted-by":"crossref","unstructured":"Voight J (2021) Quaternion algebras (v.0.9.21). https:\/\/math.dartmouth.edu\/~jvoight\/quat-book.pdf","DOI":"10.1007\/978-3-030-56694-4_2"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the Seventh International Conference on Mathematics and Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-16-6890-6_72","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T14:11:20Z","timestamp":1646489480000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-16-6890-6_72"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811668890","9789811668906"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-16-6890-6_72","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"6 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}