{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:03Z","timestamp":1767339483987,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":40,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819608904"},{"type":"electronic","value":"9789819608911"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0891-1_8","type":"book-chapter","created":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:36:57Z","timestamp":1733956617000},"page":"243-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Ideal-to-Isogeny Algorithm Using 2-Dimensional Isogenies and\u00a0Its Application to\u00a0SQIsign"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0202-8918","authenticated-orcid":false,"given":"Hiroshi","family":"Onuki","sequence":"first","affiliation":[]},{"given":"Kohei","family":"Nakagawa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"8_CR1","unstructured":"Basso, A., Feo, L.D., Dartois, P., Leroux, A., Maino, L., Pope, G., Robert, D., Wesolowski, B.: SQIsign2D-West: The fast, the small, and the safer. Cryptology ePrint Archive, Paper 2024\/760 (2024), https:\/\/eprint.iacr.org\/2024\/760, https:\/\/eprint.iacr.org\/2024\/760"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Basso, A., Maino, L., Pope, G.: FESTA: Fast encryption from supersingular torsion attacks. In: Guo, J., Steinfeld, R. (eds.) ASIACRYPT\u00a02023, Part\u00a0VII. LNCS, vol. 14444, pp. 98\u2013126. Springer, Singapore (Dec 2023). https:\/\/doi.org\/10.1007\/978-981-99-8739-9_4","DOI":"10.1007\/978-981-99-8739-9_4"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J., De\u00a0Feo, L., Leroux, A., Smith, B.: Faster computation of isogenies of large prime degree. In: Galbraith, S. (ed.) ANTS-XIV - 14th Algorithmic Number Theory Symposium. Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), vol.\u00a04, pp. 39\u201355. Mathematical Sciences Publishers, Auckland, New Zealand (2020). https:\/\/doi.org\/10.2140\/obs.2020.4.39, https:\/\/hal.inria.fr\/hal-02514201","DOI":"10.2140\/obs.2020.4.39"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Bezanson, J., Edelman, A., Karpinski, S., Shah, V.B.: Julia: A fresh approach to numerical computing. SIAM Review 59(1), 65\u201398 (2017). https:\/\/doi.org\/10.1137\/141000671, https:\/\/epubs.siam.org\/doi\/10.1137\/141000671","DOI":"10.1137\/141000671"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Castryck, W., Decru, T.: An efficient key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 423\u2013447. Springer, Cham (Apr 2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_15","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"8_CR6","unstructured":"Chavez-Saab, J., Santos, M.C., De Feo, L., Eriksen, J.K., Hess, B., Kohel, D., Leroux, A., Longa, P., Meyer, M., Panny, L., Patranabis, S., Petit, C., Rodr\u00edguez Henr\u00edquez, F., Schaeffler, S., Wesolowski, B.: SQIsign. Tech. rep., National Institute of Standards and Technology (2023), available at https:\/\/csrc.nist.gov\/Projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"8_CR7","unstructured":"Cohen, H.: A Course in Computational Algebraic Number Theory, Graduate Texts in Mathematics, vol.\u00a0138. Springer Berlin, Heidelberg (2010)"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Cosset, R., Robert, D.: Computing $$(l,l)$$-isogenies in polynomial time on Jacobians of genus $$2$$ curves. Mathematics of Computation 84(294), 1953\u20131975 (2015)","DOI":"10.1090\/S0025-5718-2014-02899-8"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Costello, C.: B-SIDH: Supersingular isogeny Diffie-Hellman using twisted torsion. In: Moriai, S., Wang, H. (eds.) ASIACRYPT\u00a02020, Part\u00a0II. LNCS, vol. 12492, pp. 440\u2013463. Springer, Cham (Dec 2020). https:\/\/doi.org\/10.1007\/978-3-030-64834-3_15","DOI":"10.1007\/978-3-030-64834-3_15"},{"key":"8_CR10","unstructured":"Dartois, P., Leroux, A., Robert, D., Wesolowski, B.: SQISignHD: New dimensions in cryptography. Cryptology ePrint Archive, Paper 2023\/436 (2023), https:\/\/eprint.iacr.org\/2023\/436, https:\/\/eprint.iacr.org\/2023\/436"},{"key":"8_CR11","unstructured":"Dartois, P., Maino, L., Pope, G., Robert, D.: An algorithmic approach to $$(2,2)$$-isogenies in the theta model and applications to isogeny-based cryptography. Cryptology ePrint Archive, Paper 2023\/1747 (2023), https:\/\/eprint.iacr.org\/2023\/1747, https:\/\/eprint.iacr.org\/2023\/1747"},{"key":"8_CR12","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: Compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT\u00a02020, Part\u00a0I. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (Dec 2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. Cryptology ePrint Archive, Report 2020\/1240 (2020), https:\/\/eprint.iacr.org\/2020\/1240","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"8_CR14","doi-asserted-by":"publisher","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for the deuring correspondence - towards practical and secure SQISign signatures. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 659\u2013690. Springer, Cham (Apr 2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Delfs, C., Galbraith, S.D.: Computing isogenies between supersingular elliptic curves over $$\\mathbb{F}_p$$. DCC 78(2), 425\u2013440 (2016). https:\/\/doi.org\/10.1007\/s10623-014-0010-1","DOI":"10.1007\/s10623-014-0010-1"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die typen der multiplikatorenringe elliptischer funktionenk\u00f6rper. Abhandlungen aus dem Mathematischen Seminar der Universit\u00e4t Hamburg 14, 197\u2013272 (1941)","DOI":"10.1007\/BF02940746"},{"key":"8_CR17","unstructured":"Duparc, M., Fouotsa, T.B.: SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies. Cryptology ePrint Archive, Paper 2024\/773 (2024). https:\/\/eprint.iacr.org\/2024\/773"},{"key":"8_CR18","unstructured":"Duparc, M., Fouotsa, T.B., Vaudenay, S.: SILBE: an updatable public key encryption scheme from lollipop attacks. Cryptology ePrint Archive, Paper 2024\/400 (2024), https:\/\/eprint.iacr.org\/2024\/400, https:\/\/eprint.iacr.org\/2024\/400"},{"key":"8_CR19","doi-asserted-by":"publisher","unstructured":"Eisentraeger, K., Hallgren, S., Leonardi, C., Morrison, T., Park, J.: Computing endomorphism rings of supersingular elliptic curves and connections to pathfinding in isogeny graphs. In: Galbraith, S. (ed.) ANTS-XIV - 14th Algorithmic Number Theory Symposium. Proceedings of the Fourteenth Algorithmic Number Theory Symposium (ANTS-XIV), vol.\u00a04, pp. 215\u2013232. Mathematical Sciences Publishers, Auckland, New Zealand (Jun 2020). https:\/\/doi.org\/10.2140\/obs.2020.4.215","DOI":"10.2140\/obs.2020.4.215"},{"key":"8_CR20","doi-asserted-by":"publisher","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Lauter, K.E., Morrison, T., Petit, C.: Supersingular isogeny graphs and endomorphism rings: Reductions and solutions. In: Nielsen, J.B., Rijmen, V. (eds.) EUROCRYPT\u00a02018, Part\u00a0III. LNCS, vol. 10822, pp. 329\u2013368. Springer, Cham (Apr\u00a0\/\u00a0May 2018). https:\/\/doi.org\/10.1007\/978-3-319-78372-7_11","DOI":"10.1007\/978-3-319-78372-7_11"},{"key":"8_CR21","doi-asserted-by":"publisher","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO\u201986. LNCS, vol.\u00a0263, pp. 186\u2013194. Springer, Berlin, Heidelberg (Aug 1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"key":"8_CR22","doi-asserted-by":"publisher","unstructured":"Fieker, C., Hart, W., Hofmann, T., Johansson, F.: Nemo\/hecke: Computer algebra and number theory packages for the julia programming language. In: Proceedings of the 2017 ACM on International Symposium on Symbolic and Algebraic Computation. pp. 157\u2013164. ISSAC \u201917, ACM, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3087604.3087611, http:\/\/doi.acm.org\/10.1145\/3087604.3087611","DOI":"10.1145\/3087604.3087611"},{"key":"8_CR23","doi-asserted-by":"publisher","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. In: Takagi, T., Peyrin, T. (eds.) ASIACRYPT\u00a02017, Part\u00a0I. LNCS, vol. 10624, pp. 3\u201333. Springer, Cham (Dec 2017). https:\/\/doi.org\/10.1007\/978-3-319-70694-8_1","DOI":"10.1007\/978-3-319-70694-8_1"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Howe, E.W., Lepr\u00e9vost, F., Poonen, B.: Large torsion subgroups of split Jacobians of curves of genus two or three. Forum Mathematicum 12(3), 315\u2013364 (2000)","DOI":"10.1515\/form.2000.008"},{"key":"8_CR25","doi-asserted-by":"publisher","unstructured":"Jao, D., De Feo, L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang, B.Y. (ed.) Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011. pp. 19\u201334. Springer, Berlin, Heidelberg (Nov\u00a0\/\u00a0Dec 2011). https:\/\/doi.org\/10.1007\/978-3-642-25405-5_2","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"8_CR26","doi-asserted-by":"publisher","unstructured":"Kani, E.: The number of curves of genus two with elliptic differentials. Journal f\u00fcr die reine und angewandte Mathematik 485, 93\u2013122 (1997). https:\/\/doi.org\/10.1515\/crll.1997.485.93","DOI":"10.1515\/crll.1997.485.93"},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion $$\\ell $$-isogeny path problem. LMS Journal of Computation and Mathematics 17(A), 418\u2013432 (2014). https:\/\/doi.org\/10.1112\/S1461157014000151, https:\/\/hal.archives-ouvertes.fr\/hal-01257092","DOI":"10.1112\/S1461157014000151"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"Lang, S.: Elliptic Functions. Graduate texts in mathematics, Springer, 2nd edn. (1987), https:\/\/books.google.co.jp\/books?id=IxRZAAAAYAAJ","DOI":"10.1007\/978-1-4612-4752-4"},{"key":"8_CR29","unstructured":"Leroux, A.: Verifiable random function from the Deuring correspondence and higher dimensional isogenies. Cryptology ePrint Archive, Paper 2023\/1251 (2023), https:\/\/eprint.iacr.org\/2023\/1251, https:\/\/eprint.iacr.org\/2023\/1251"},{"key":"8_CR30","doi-asserted-by":"publisher","unstructured":"Lubicz, D., Robert, D.: Computing isogenies between abelian varieties. Compositio Mathematica 148(5), 1483\u20131515 (2012). https:\/\/doi.org\/10.1112\/S0010437X12000243","DOI":"10.1112\/S0010437X12000243"},{"key":"8_CR31","doi-asserted-by":"publisher","unstructured":"Maino, L., Martindale, C., Panny, L., Pope, G., Wesolowski, B.: A direct key recovery attack on SIDH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 448\u2013471. Springer, Cham (Apr 2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_16","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"8_CR32","unstructured":"Nakagawa, K., Onuki, H.: QFESTA: Efficient algorithms and parameters for FESTA using quaternion algebras. Cryptology ePrint Archive, Paper 2023\/1468 (2023), https:\/\/eprint.iacr.org\/2023\/1468, https:\/\/eprint.iacr.org\/2023\/1468"},{"key":"8_CR33","unstructured":"Nakagawa, K., Onuki, H.: SQIsign2D-East: A new signature scheme using 2-dimensional isogenies. Cryptology ePrint Archive, Paper 2024\/771 (2024), https:\/\/eprint.iacr.org\/2024\/771, https:\/\/eprint.iacr.org\/2024\/771"},{"key":"8_CR34","doi-asserted-by":"publisher","unstructured":"Onuki, H.: On the key generation in SQISign. Banach Center Publications 126, 89\u2013104 (2023). https:\/\/doi.org\/10.4064\/bc126-6","DOI":"10.4064\/bc126-6"},{"key":"8_CR35","unstructured":"Petit, C., Smith, S.: An improvement to the quaternion analogue of the $$l$$-isogeny path problem (2018), conference talk at MathCrypt 2018"},{"key":"8_CR36","doi-asserted-by":"publisher","unstructured":"Robert, D.: Breaking SIDH in polynomial time. In: Hazay, C., Stam, M. (eds.) EUROCRYPT\u00a02023, Part\u00a0V. LNCS, vol. 14008, pp. 472\u2013503. Springer, Cham (Apr 2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_17","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"8_CR37","doi-asserted-by":"publisher","unstructured":"Corte-Real Santos, M., Eriksen, J.K., Meyer, M., Reijnders, K.: Apr\u00e8sSQI: Extra fast verification for SQIsign using extension-field signing. In: Joye, M., Leander, G. (eds.) EUROCRYPT\u00a02024, Part\u00a0I. LNCS, vol. 14651, pp. 63\u201393. Springer, Cham (May 2024). https:\/\/doi.org\/10.1007\/978-3-031-58716-0_3","DOI":"10.1007\/978-3-031-58716-0_3"},{"key":"8_CR38","unstructured":"Smith, B.A.: Explicit endomorphisms and correspondences. PhD thesis, University of Sydney (2005)"},{"key":"8_CR39","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques. Comptes-Rendues de l\u2019Acad\u00e9mie des Sciences 273, 238\u2013241 (1971)"},{"key":"8_CR40","doi-asserted-by":"publisher","unstructured":"Voight, J.: Quaternion Algebras. Graduate Texts in Mathematics, Springer Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-56694-4","DOI":"10.1007\/978-3-030-56694-4"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 ASIACRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0891-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,11]],"date-time":"2024-12-11T22:43:05Z","timestamp":1733956985000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0891-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9789819608904","9789819608911"],"references-count":40,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0891-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASIACRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Theory and Application of Cryptology and Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kolkata","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asiacrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asiacrypt.iacr.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}