{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T05:49:59Z","timestamp":1743140999345,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819744640"},{"type":"electronic","value":"9789819744657"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-4465-7_13","type":"book-chapter","created":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:01:46Z","timestamp":1720717306000},"page":"181-194","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Revisiting the\u00a0Algorithms for\u00a0the\u00a0Quaternion $$\\ell $$-Isogeny Path Problems"],"prefix":"10.1007","author":[{"given":"Hyungrok","family":"Jo","sequence":"first","affiliation":[]},{"given":"Junji","family":"Shikata","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,12]]},"reference":[{"issue":"1","key":"13_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"D Charles","year":"2009","unstructured":"Charles, D., Lauter, K., Goren, E.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009)","journal-title":"J. Cryptol."},{"key":"13_CR2","unstructured":"Couveignes, J.M.: Hard Homogeneous Spaces, IACR Cryptol. ePrint Arch (2006). https:\/\/ia.cr\/2006\/291"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Deuring, M.: Die Typen der Multiplikatorenringe elliptischer Funktionenk\u00f6rper: G. Herglotz zum 60. Geburtstag gewidmet. Abhandlungen aus dem Mathematischen Seminar der Universit\u00e4t Hamburg 14(1), 197\u2013272 (1941)","DOI":"10.1007\/BF02940746"},{"key":"13_CR4","unstructured":"D\u00e9ch\u00e8ne, I.: Quaternion algebras and the graph method for elliptic curves, Master\u2019s Thesis, Department of Mathematics and Statistics, McGill University, Montreal (1998)"},{"key":"13_CR5","doi-asserted-by":"publisher","unstructured":"De Feo, L., Kohel, D., Leroux, A., Petit, C., Wesolowski, B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai, S., Wang, H. (eds.) ASIACRYPT 2020. LNCS, vol. 12491, pp. 64\u201393. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-64837-4_3","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"13_CR6","doi-asserted-by":"publisher","unstructured":"De Feo, L., Leroux, A., Longa, P., Wesolowski, B.: New algorithms for\u00a0the\u00a0deuring correspondence: towards practical and secure SQISign signatures. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, pp. 659\u2013690. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-30589-4_23","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"13_CR7","unstructured":"Dimitrij, R.: Constructing the Deuring Correspondence with Applications to Supersingular Isogeny-Based Cryptography, Master\u2019s Thesis, Technische Universiteit Eindhoven University of Technology (2018)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Eisentr\u00e4ger, K., Hallgren, S., Lauter, K., Morrison, T., Petit, C.: Supersingular isogeny graphs and endomorphism rings: reductions and solutions, In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 329\u2013368. Springer, Cham (2018)","DOI":"10.1007\/978-3-319-78372-7_11"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Galbraith, S.D., Petit, C., Silva, J.: Identification protocols and signature schemes based on supersingular isogeny problems. J. Cryptol. 33(1), 130\u2013175 (2020)","DOI":"10.1007\/s00145-019-09316-0"},{"key":"13_CR10","doi-asserted-by":"publisher","unstructured":"Jo, H., Sugiyama, S., Yamasaki, Y.: Ramanujan graphs for post-quantum cryptography, In: Takagi, T., Wakayama, M., Tanaka, K., Kunihiro, N., Kimoto, K., Ikematsu, Y. (eds.) International Symposium on Mathematics, Quantum Theory, and Cryptography. Mathematics for Industry, vol. 33. pp. 231\u2013250. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-15-5191-8_17","DOI":"10.1007\/978-981-15-5191-8_17"},{"key":"13_CR11","unstructured":"Kambe, Y., et al.: Solving the constructive deuring correspondence via the Kohel-Lauter-Petit-Tignol algorithm. Math. Cryptol. 1(2), 10\u201324 (2021)"},{"issue":"3","key":"13_CR12","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1287\/moor.12.3.415","volume":"12","author":"R Kannan","year":"1987","unstructured":"Kannan, R.: Minkowski\u2019s convex body theorem and integer programming. Math. Oper. Res. 12(3), 415\u2013440 (1987)","journal-title":"Math. Oper. Res."},{"key":"13_CR13","unstructured":"Kohel, D.: Endomorphism rings of elliptic curves over finite fields, Ph.D. Thesis, University of California, Berkeley (1996)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Kohel, D., Lauter, K., Petit, C., Tignol, J.P.: On the quaternion $$l$$-isogeny path problem. LMS J. Comput. Math. 17(A), 418\u2013432 (2014)","DOI":"10.1112\/S1461157014000151"},{"key":"13_CR15","unstructured":"Mestre, J.F., Jorza, A.T.: The Method of Graphs. Examples and Applications, Notes (2011). https:\/\/www.williamstein.org\/papers\/rank4\/mestre-en.pdf"},{"key":"13_CR16","doi-asserted-by":"publisher","unstructured":"Micciancio, D., Goldwasser, S.: Complexity of Lattice Problems. Springer, Boston (2002). https:\/\/doi.org\/10.1007\/978-1-4615-0897-7","DOI":"10.1007\/978-1-4615-0897-7"},{"key":"13_CR17","unstructured":"NIST. Post-Quantum Cryptography: Digital Signature Schemes: Round 1 Additional Signatures (2023). https:\/\/csrc.nist.gov\/projects\/pqc-dig-sig\/round-1-additional-signatures"},{"key":"13_CR18","unstructured":"Petit, C., Quisquater, J.-J.: Rubik\u2019s for cryptographers. IACR Cryptol. ePrint Arch. (2011). https:\/\/ia.cr\/2011\/638"},{"key":"13_CR19","unstructured":"Petit, C., Smith, S.: An improvement to the quaternion analogue of the $$l$$-isogeny problem, presentation slide in MathCrypt2018 (2018). https:\/\/crypto.iacr.org\/2018\/affevents\/mathcrypt\/medias\/08-50_3.pdf"},{"issue":"4","key":"13_CR20","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1515\/jmc-2017-0051","volume":"12","author":"EC Pinto","year":"2018","unstructured":"Pinto, E.C., Petit, C.: Better path-finding algorithms in LPS Ramanujan graphs. J. Math. Cryptol. 12(4), 191\u2013202 (2018)","journal-title":"J. Math. Cryptol."},{"issue":"2","key":"13_CR21","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/0021-8693(80)90151-9","volume":"64","author":"AK Pizer","year":"1980","unstructured":"Pizer, A.K.: An algorithm for computing modular forms on $$\\Gamma _0(N)$$. J. Algebra 64(2), 340\u2013390 (1980)","journal-title":"J. Algebra"},{"key":"13_CR22","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1090\/amsip\/007\/08","volume":"7","author":"AK Pizer","year":"1998","unstructured":"Pizer, A.K.: Ramanujan graphs. AMS IP Stud. Adv. Math. 7, 159\u2013178 (1998)","journal-title":"AMS IP Stud. Adv. Math."},{"key":"13_CR23","unstructured":"Rostovtsev, A., Stolbunov, A.: Public-key cryptosystem based on isogenies. IACR Cryptol. ePrint Arch. (2006). https:\/\/ia.cr\/2006\/145"},{"key":"13_CR24","doi-asserted-by":"publisher","first-page":"13839","DOI":"10.1093\/imrn\/rnz233","volume":"18","author":"NT Sardari","year":"2021","unstructured":"Sardari, N.T.: Complexity of strong approximation on the sphere. Int. Math. Res. Not. 18, 13839\u201313866 (2021)","journal-title":"Int. Math. Res. Not."},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Silverman, J.H.: The Arithmetic of Elliptic Curves. Graduate Texts in Mathematics, 2nd edn., vol. 106. Springer, New York (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"13_CR26","unstructured":"V\u00e9lu, J.: Isog\u00e9nies entre courbes elliptiques, CR Acad. Sci. Paris, S\u00e9ries A 273, 305\u2013347 (1971)"},{"key":"13_CR27","series-title":"Graduate Texts in Mathematics","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56694-4","volume-title":"Quaternion Algebras","author":"John Voight","year":"2021","unstructured":"Voight, John: Quaternion Algebras. GTM, vol. 288. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-56694-4"}],"container-title":["Communications in Computer and Information Science","Mobile Internet Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-4465-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T17:03:24Z","timestamp":1720717404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-4465-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819744640","9789819744657"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-4465-7_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Internet Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Okinawa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 December 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobisec2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/isyou.biz\/conf\/mobisec23\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}