{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,21]],"date-time":"2026-05-21T01:13:49Z","timestamp":1779326029966,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":36,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819551125","type":"print"},{"value":"9789819551132","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-5113-2_6","type":"book-chapter","created":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T15:43:30Z","timestamp":1765122210000},"page":"174-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["$$\\textsf{Qlapoti}$$: Simple and\u00a0Efficient Translation of\u00a0Quaternion Ideals to\u00a0Isogenies"],"prefix":"10.1007","author":[{"given":"Giacomo","family":"Borin","sequence":"first","affiliation":[]},{"given":"Maria","family":"Corte-Real Santos","sequence":"additional","affiliation":[]},{"given":"Jonathan Komada","family":"Eriksen","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Invernizzi","sequence":"additional","affiliation":[]},{"given":"Marzio","family":"Mula","sequence":"additional","affiliation":[]},{"given":"Sina","family":"Schaeffler","sequence":"additional","affiliation":[]},{"given":"Frederik","family":"Vercauteren","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,12,8]]},"reference":[{"key":"6_CR1","unstructured":"Aardal, M.A., et al.: Optimized One-Dimensional SQIsign Verification on Intel and Cortex-M4. Cryptology ePrint Archive, Report 2024\/1563 (2024). https:\/\/eprint.iacr.org\/2024\/1563"},{"key":"6_CR2","unstructured":"Aardal, M.A., et al.: SQISign Specification. Technical report. version 2.0 from 2025-02-05. National Institute of Standards and Technology (2025). https:\/\/sqisign.org"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Aardal, M.A., Basso, A., De Feo, L., Patranabis, S., Wesolowski, B.: A Complete Security Proof of SQIsign. Cryptology ePrint Archive, Paper 2025\/379 (2025). https:\/\/eprint.iacr.org\/2025\/379","DOI":"10.1007\/978-3-032-01887-8_7"},{"key":"6_CR4","unstructured":"Aono, Y., Espitau, T., Nguyen, P.Q.: Random Lattices: Theory and Practice (2018). https:\/\/espitau.github.io\/bin\/random_lattice.pdf"},{"key":"6_CR5","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: PRISM: simple and compact identification and signatures from large prime degree isogenies. In: Jager, T., Pan, J. (eds.) Public- Key Cryptography \u2013 PKC 2025, pp. 300\u2013332. Springer, Cham (2025). https:\/\/doi.org\/10.1007\/978-3-031-91826-1_10","DOI":"10.1007\/978-3-031-91826-1_10"},{"key":"6_CR6","doi-asserted-by":"publisher","unstructured":"Basso, A., et al.: SQIsign2DWest - the fast, the small, and the safer. In: Chung, K.M., Sasaki, Y. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2024, Part III. LNCS, Kolkata, India, vol. 15486, pp. 339\u2013370. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_11","DOI":"10.1007\/978-981-96-0891-1_11"},{"key":"6_CR7","unstructured":"Castryck, W., Chen, M., Invernizzi, R., Lorenzon, G., Vercauteren, F.: Breaking and Repairing SQIsign2D-East. Cryptology ePrint Archive, Paper 2024\/1453 (2024). https:\/\/eprint.iacr.org\/2024\/1453"},{"key":"6_CR8","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, Part V. LNCS, Lyon, France, vol. 14008, pp. 423-447. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"6_CR9","unstructured":"Cornacchia, G.: Su di un metodo per la risoluzione in numeri interi dell\u2019equazione $$\\sum _{h=0}^n c_h x^{n-h}y^h=p$$. Battaglini 46, 33\u201390 (1908)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Dartois, P., et al.: PEGASIS: Practical Effective Class Group Action using 4-Dimensional Isogenies. Cryptology ePrint Archive, Paper 2025\/401 (2025). https:\/\/eprint.iacr.org\/2025\/401","DOI":"10.1007\/978-3-032-01855-7_3"},{"key":"6_CR11","doi-asserted-by":"publisher","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQIsignHD: new dimensions in cryptography. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024, Part I. LNCS, Zurich, Switzerland, vol. 14651, pp. 3\u201332. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_1","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"6_CR12","unstructured":"De Feo, L.: Mathematics of isogeny based cryptography. arXiv preprint arXiv:1711.04062 (2017)"},{"key":"6_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-030-64837-4_3","volume-title":"Advances in Cryptology \u2013 ASIACRYPT 2020","author":"L De Feo","year":"2020","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3"},{"key":"6_CR14","doi-asserted-by":"publisher","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the Deuring correspondence \u2013 towards practical and secure SQIsign signatures. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, Part V. LNCS, Lyon, France, vol. 14008, pp. 659\u2013690. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper. Abhandlungen aus dem mathematischen Seminar der Universit\u00e4t Hamburg, vol. 14, pp. 197\u2013272. Springer, Heidelberg (1941)","DOI":"10.1007\/BF02940746"},{"key":"6_CR16","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) Advances in Cryptology \u2013 ASIACRYPT 2017, Part I. LNCS, Hong Kong, China, vol. 10624, pp. 3\u201333. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"6_CR17","unstructured":"H\u00fclsing, A., et al.: SPHINCS+. Technical report. National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"6_CR18","doi-asserted-by":"publisher","unstructured":"Kani, E.: The existence of curves of genus two with elliptic differentials. J. Numb. Theory 64(1), 130\u2013161 (1997). ISSN: 0022- 314X, 1096-1658. https:\/\/doi.org\/10.1006\/jnth.1997.2105","DOI":"10.1006\/jnth.1997.2105"},{"issue":"5","key":"6_CR19","doi-asserted-by":"publisher","first-page":"1714","DOI":"10.1137\/080734467","volume":"39","author":"M Kirschmer","year":"2010","unstructured":"Kirschmer, M., Voight, J.: Algorithmic enumeration of ideal classes for quaternion orders. SIAM J. Comput. 39(5), 1714\u20131747 (2010)","journal-title":"SIAM J. Comput."},{"key":"6_CR20","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1112\/S1461157014000151","volume":"17","author":"D Kohel","year":"2014","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion-isogeny path problem. LMS J. Comput. Math. 17, 418\u2013432 (2014)","journal-title":"LMS J. Comput. Math."},{"key":"6_CR21","unstructured":"Landau, E.: \u00dcber die Einteilung der positiven ganzen Zahlen in vier Klassen nach der Mindestzahl der zu ihrer additiven Zusammensetzung erforderlichen Quadrate. Archiv der Mathematik und Physik 13(3), 305\u2013312 (1908)"},{"key":"6_CR22","unstructured":"Lyubashevsky, V., et al.: Crystals-dilithium. Technical report. National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"6_CR23","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. Advances in Cryptology \u2013 EUROCRYPT 2023, Part V. LNCS, Lyon, France, vol. 14008, pp. 448\u2013471. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"6_CR24","unstructured":"Morain, F., Nicolas, J.L.: On Cornacchia\u2019s algorithm for solving the diophantine equation $$u^{2} + dv^{2} = m$$\u201d. Projet 1000, a1 (1990)"},{"key":"6_CR25","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: efficient algorithms and parameters for FESTA using quaternion algebras. In: Reyzin, L., Stebila, D. (eds.) Advances in Cryptology \u2013 CRYPTO 2024, Part V. LNCS, Santa Barbara, CA, USA, vol. 14924, pp. 75\u2013106. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-68388-6_4","DOI":"10.1007\/978-3-031-68388-6_4"},{"key":"6_CR26","doi-asserted-by":"publisher","unstructured":"Nakagawa, K., et al.: SQIsign2D-east: a new signature scheme using 2-dimensional isogenies. In: Chung, K.M., Sasaki, Y. Advances in Cryptology \u2013 ASIACRYPT 2024, Part III. LNCS, Kolkata, India, vol. 15486, pp. 272\u2013303. Springer, Singapore (2024). https:\/\/doi.org\/10.1007\/978-981-96-0891-1_9","DOI":"10.1007\/978-981-96-0891-1_9"},{"key":"6_CR27","unstructured":"NIST. Post-Quantum Cryptography: Additional Digital Signature Schemes (2022). https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig"},{"key":"6_CR28","unstructured":"Page, A., Robert, D.: Introducing clapoti(s): Evaluating the isogeny class group action in polynomial time. Cryptology ePrint Archive, Report 2023\/1766 (2023). https:\/\/eprint.iacr.org\/2023\/1766"},{"key":"6_CR29","doi-asserted-by":"publisher","unstructured":"Page, A., Wesolowski, B.: The supersingular endomorphism ring and one endomorphism problems are equivalent. In: Joye, M., Leander, G. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2024, Part VI. LNCS, Zurich, Switzerland, vol. 14656, pp. 388\u2013417. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-58751-1_14","DOI":"10.1007\/978-3-031-58751-1_14"},{"key":"6_CR30","unstructured":"PQ-SORT: Post-Quantum Signatures On-Ramp Tests. https:\/\/pqsort.tii.ae\/. Accessed 14 May 2025"},{"key":"6_CR31","unstructured":"Prest, T., et al.: FALCON. Technical report. National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selectedalgorithms-2022"},{"key":"6_CR32","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2023, Part V. LNCS, Lyon, France, vol. 14008, pp. 472\u2013503. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"6_CR33","unstructured":"Robert, D.: On the efficient representation of isogenies (a survey). Cryptology ePrint Archive, Report 2024\/1071 (2024). https:\/\/eprint.iacr.org\/2024\/1071"},{"key":"6_CR34","unstructured":"Schwabe, P., et al.: Crystals-kyber. Technical report. National Institute of Standards and Technology (2022). https:\/\/csrc.nist.gov\/Projects\/post-quantum-cryptography\/selected-algorithms-2022"},{"key":"6_CR35","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves, vol. 106. Springer, Heidelberg (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"6_CR36","doi-asserted-by":"publisher","unstructured":"Voight, J.: Quaternion Algebras, vol. 288, pp. xxiii+885. Graduate Texts in Mathematics. Springer, Cham (2021). ISBN: 978-3-030-56692-0; 978-3-030-56694-4. https:\/\/doi.org\/10.1007\/978-3-030-56694-4","DOI":"10.1007\/978-3-030-56694-4"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-5113-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,7]],"date-time":"2025-12-07T15:43:34Z","timestamp":1765122214000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-5113-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"ISBN":["9789819551125","9789819551132"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-5113-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,12,8]]},"assertion":[{"value":"8 December 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, VIC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}