{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T07:42:47Z","timestamp":1777534967615,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":34,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819608904","type":"print"},{"value":"9789819608911","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_12","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:37:36Z","timestamp":1733956656000},"page":"371-395","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Extending Class Group Action Attacks via\u00a0Sesquilinear Pairings"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-1843-6459","authenticated-orcid":false,"given":"Joseph","family":"Macula","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2294-0397","authenticated-orcid":false,"given":"Katherine E.","family":"Stange","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"12_CR1","unstructured":"Sarah Arpin, Wouter Castryck, Jonathan Komada\u00a0Eriksen, Gioella Lorenzon, and Frederick Vercauteren. International workshop on the arithmetic of finite fields. In Generalized class group actions on oriented elliptic curves with level structure, 2024."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Sarah Arpin. Adding level structure to supersingular elliptic curve isogeny graphs. Journal de Th\u00e9orie des Nombres de Bourdeaux, to appear, 2024.","DOI":"10.5802\/jtnb.1283"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Andrea Basso and Tako\u00a0Boris Fouotsa. New SIDH countermeasures for a more efficient key exchange. In Advances in cryptology\u2014ASIACRYPT 2023. Part VIII, volume 14445 of Lecture Notes in Comput. Sci., pages 208\u2013233. Springer, Singapore, [2023] 2023.","DOI":"10.1007\/978-981-99-8742-9_7"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Andrea Basso, Luciano Maino, and Giacomo Pope. FESTA: fast encryption from supersingular torsion attacks. In Advances in cryptology\u2014ASIACRYPT 2023. Part VII, volume 14444 of Lecture Notes in Comput. Sci., pages 98\u2013126. Springer, Singapore, [2023] 2023.","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"Wouter Castryck and Thomas Decru. An efficient key recovery attack on SIDH. In Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci., pages 423\u2013447. Springer, Cham, [2023] 2023.","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"12_CR6","unstructured":"Wouter Castryck, Thomas Decru, Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, Damien Robert, and Benjamin Wesolowski. Isogeny interpolation, 2024.Manuscript in preparation, presented at Caipi Symposium, Rennes, April 30, 2024, https:\/\/caipi_symposium.pages.math.cnrs.fr\/page-web\/editions\/avr24.html."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Wouter Castryck, Marc Houben, Simon-Philipp Merz, Marzio Mula, Sam\u00a0van Buuren, and Frederik Vercauteren. Weak instances of class group action based cryptography via self-pairings. In Helena Handschuh and Anna Lysyanskaya, editors, Advances in Cryptology \u2013 CRYPTO 2023, pages 762\u2013792, Cham, 2023. Springer Nature Switzerland.","DOI":"10.1007\/978-3-031-38548-3_25"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Wouter Castryck, Marc Houben, Frederik Vercauteren, and Benjamin Wesolowski. On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves. Res. Number Theory, 8(4):Paper No. 99, 18, 2022.","DOI":"10.1007\/s40993-022-00399-6"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1515\/jmc-2019-0034","volume":"14","author":"L Col\u00f2","year":"2020","unstructured":"Leonardo Col\u00f2 and David Kohel. Orienting supersingular isogeny graphs. J. Math. Cryptol., 14(1):414\u2013437, 2020.","journal-title":"J. Math. Cryptol."},{"key":"12_CR10","unstructured":"Giulio Codogni and Guido Lido. Spectral theory of isogeny graphs, 2024. https:\/\/arxiv.org\/abs\/2308.13913."},{"issue":"1","key":"12_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Denis\u00a0X. Charles, Kristin\u00a0E. Lauter, and Eyal\u00a0Z. Goren. Cryptographic hash functions from expander graphs. J. Cryptology, 22(1):93\u2013113, 2009.","journal-title":"J. Cryptology"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"Wouter Castryck, Tanja Lange, Chloe Martindale, Lorenz Panny, and Joost Renes. CSIDH: an efficient post-quantum commutative group action. In Advances in cryptology\u2014ASIACRYPT 2018. Part III, volume 11274 of Lecture Notes in Comput. Sci., pages 395\u2013427. Springer, Cham, 2018.","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"12_CR13","unstructured":"Jean-Marc Couveignes. Hard homogeneous spaces. Cryptology ePrint Archive, Paper 2006\/291, 2006. https:\/\/eprint.iacr.org\/2006\/291."},{"key":"12_CR14","volume-title":"Primes of the Form $$x^2 + ny^2$$: Fermat, Class Field Theory, and Complex Multiplication","author":"DA Cox","year":"2022","unstructured":"David\u00a0A. Cox. Primes of the Form $$x^2 + ny^2$$: Fermat, Class Field Theory, and Complex Multiplication. Third Edition with Solutions. AMS Chelsea Publishing, 2022."},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Wouter Castryck, Jana Sot\u00e1kov\u00e1, and Frederik Vercauteren. Breaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended version. J. Cryptology, 35(4):Paper No. 24, 30, 2022.","DOI":"10.1007\/s00145-022-09435-1"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"Daniel Cervantes-V\u00e1zquez, Mathilde Chenu, Jes\u00fas-Javier Chi-Dom\u00ednguez, Luca De\u00a0Feo, Francisco Rodr\u00edguez-Henr\u00edquez, and Benjamin Smith. Stronger and faster side-channel protections for CSIDH.In Progress in cryptology\u2014LATINCRYPT 2019, volume 11774 of Lecture Notes in Comput. Sci., pages 173\u2013193. Springer, Cham, 2019.","DOI":"10.1007\/978-3-030-30530-7_9"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"Kirsten Eisentr\u00e4ger, Sean Hallgren, Chris Leonardi, Travis Morrison, and Jennifer Park. Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs. In ANTS XIV\u2014Proceedings of the Fourteenth Algorithmic Number Theory Symposium, volume\u00a04 of Open Book Ser., pages 215\u2013232. Math. Sci. Publ., Berkeley, CA, 2020.","DOI":"10.2140\/obs.2020.4.215"},{"key":"12_CR18","volume-title":"Tako Boris Fouotsa, and Lorenz Panny","author":"L De Feo","year":"2024","unstructured":"Luca\u00a0De Feo, Tako\u00a0Boris Fouotsa, and Lorenz Panny. Isogeny problems with level structure. Springer-Verlag, 2024."},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Tako\u00a0Boris Fouotsa, Tomoki Moriya, and Christophe Petit. M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci., pages 282\u2013309. Springer, Cham, [2023] 2023.","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"12_CR20","unstructured":"Steven\u00a0D. Galbraith, Derek Perrin, and Jos\u00e9\u00a0Felipe Voloch. CSIDH with level structure. Cryptology ePrint Archive, Paper 2023\/1726, 2023."},{"issue":"281","key":"12_CR21","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1090\/S0025-5718-2012-02622-6","volume":"82","author":"S Ionica","year":"2013","unstructured":"Sorina Ionica and Antoine Joux. Pairing the volcano. Math. Comp., 82(281):581\u2013603, 2013.","journal-title":"Math. Comp."},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"David Kohel, Kristin Lauter, Christophe Petit, and Jean-Pierre Tignol. On the quaternion $$\\ell $$-isogeny path problem. LMS J.Comput. Math., 2014.","DOI":"10.1112\/S1461157014000151"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Takeshi Koshiba and Katsuyuki Takashima. New assumptions on isogenous pairing groups with applications to attribute-based encryption. In Information security and cryptology\u2014ICISC 2018, volume 11396 of Lecture Notes in Comput. Sci., pages 3\u201319. Springer, Cham, 2019.","DOI":"10.1007\/978-3-030-12146-4_1"},{"issue":"2","key":"12_CR24","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1006\/jnth.1996.0015","volume":"56","author":"HW Lenstra Jr","year":"1996","unstructured":"H.\u00a0W. Lenstra, Jr. Complex multiplication structure of elliptic curves. J. Number Theory, 56(2):227\u2013241, 1996.","journal-title":"J. Number Theory"},{"issue":"4","key":"12_CR25","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/s00145-004-0315-8","volume":"17","author":"VS Miller","year":"2004","unstructured":"Victor\u00a0S. Miller. The weil pairing, and its efficient calculation. J. Cryptology, 17(4):235\u2013261, 2004.","journal-title":"J. Cryptology"},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"Luciano Maino, Chloe Martindale, Lorenz Panny, Giacomo Pope, and Benjamin Wesolowski. A direct key recovery attack on SIDH. In Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci., pages 448\u2013471. Springer, Cham, [2023] 2023.","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Tomoki Moriya, Hiroshi Onuki, and Tsuyoshi Takagi. SiGamal: a supersingular isogeny-based PKE and its application to a PRF. In Advances in cryptology\u2014ASIACRYPT 2020. Part II, volume 12492 of Lecture Notes in Comput. Sci., pages 551\u2013580. Springer, Cham, [2020] 2020.","DOI":"10.1007\/978-3-030-64834-3_19"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"Krijn Reijnders. Effective pairings in isogeny-based cryptography. In Progress in cryptology\u2014LATINCRYPT 2023, volume 14168 of Lecture Notes in Comput. Sci., pages 109\u2013128. Springer, Cham, [2023] 2023.","DOI":"10.1007\/978-3-031-44469-2_6"},{"key":"12_CR29","unstructured":"Damien Robert. The geometric interpretation of the Tate pairing and its applications. Cryptology ePrint Archive, Paper 2023\/177, 2023. https:\/\/eprint.iacr.org\/2023\/177."},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Damien Robert. Breaking SIDH in polynomial time. In Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci., pages 472\u2013503. Springer, Cham, [2023] 2023.","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"12_CR31","unstructured":"Alexander Rostovtsev and Anton Stolbunov. Public-key cryptosystem based on isogenies. Cryptology ePrint Archive, Paper 2006\/145, 2006. https:\/\/eprint.iacr.org\/2006\/145."},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Joseph\u00a0H. Silverman. The Arithmetic of Elliptic Curves, Second Edition. Springer, 2009.","DOI":"10.1007\/978-0-387-09494-6"},{"key":"12_CR33","unstructured":"Katherine\u00a0E. Stange. Sesquilinear pairings on elliptic curves, 2024. https:\/\/arxiv.org\/abs\/2405.14167."},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Benjamin Wesolowski. The supersingular isogeny path and endomorphism ring problems are equivalent. In 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science\u2014FOCS 2021, pages 1100\u20131111. IEEE Computer Soc., Los Alamitos, CA, [2022] 2022.","DOI":"10.1109\/FOCS52979.2021.00109"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:43:17Z","timestamp":1733956997000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}