{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:33:12Z","timestamp":1775773992066,"version":"3.50.1"},"reference-count":72,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T00:00:00Z","timestamp":1762214400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Cryptol"],"published-print":{"date-parts":[[2026,1]]},"DOI":"10.1007\/s00145-025-09552-7","type":"journal-article","created":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:15:36Z","timestamp":1762298136000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Efficient Algorithms for the Detection of (N,\u00a0N)-Splittings and Endomorphisms"],"prefix":"10.1007","volume":"39","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2651-8951","authenticated-orcid":false,"given":"Maria","family":"Corte-Real Santos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5423-7714","authenticated-orcid":false,"given":"Craig","family":"Costello","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8904-6253","authenticated-orcid":false,"given":"Sam","family":"Frengley","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,4]]},"reference":[{"key":"9552_CR1","doi-asserted-by":"crossref","unstructured":"A.\u00a0Basso, L.\u00a0Maino, G.\u00a0Pope, FESTA: fast encryption from supersingular torsion attacks, in Advances in Cryptology\u2014ASIACRYPT 2023. Part VII, volume 14444 of Lecture Notes in Comput. Sci. (Springer, Singapore, 2023), pp. 98\u2013126","DOI":"10.1007\/978-981-99-8739-9_4"},{"issue":"1","key":"9552_CR2","doi-asserted-by":"publisher","first-page":"47","DOI":"10.2307\/2369402","volume":"10","author":"O Bolza","year":"1887","unstructured":"O.\u00a0Bolza. On binary sextics with linear transformations into themselves. Amer. J. Math., 10(1), 47\u201370, (1887)","journal-title":"Amer. J. Math."},{"key":"9552_CR3","doi-asserted-by":"crossref","unstructured":"W.\u00a0Bosma, J.\u00a0Cannon, C.\u00a0Playoust. The Magma algebra system. I. The user language. J. Symbolic Comput., 24(3-4), 235\u2013265, (1997). Computational algebra and number theory.","DOI":"10.1006\/jsco.1996.0125"},{"key":"9552_CR4","unstructured":"B.\u00a0Brock. Superspecial curves of genera two and three. PhD thesis, Princeton University, 1994."},{"issue":"1","key":"9552_CR5","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1112\/S1461157014000461","volume":"18","author":"R Br\u00f6ker","year":"2015","unstructured":"R.\u00a0Br\u00f6ker, E.\u00a0W. Howe, K.\u00a0E. Lauter, P.\u00a0Stevenhagen. Genus-2 curves and Jacobians with a given number of points. LMS J. Comput. Math., 18(1), 170\u2013197, (2015)","journal-title":"LMS J. Comput. Math."},{"issue":"5","key":"9552_CR6","doi-asserted-by":"publisher","first-page":"992","DOI":"10.4153\/CJM-2011-039-3","volume":"63","author":"N Bruin","year":"2011","unstructured":"N.\u00a0Bruin, K.\u00a0Doerksen. The arithmetic of genus two curves with $$(4,4)$$-split Jacobians. Canad. J. Math., 63(5), 992\u20131024, (2011)","journal-title":"Canad. J. Math."},{"key":"9552_CR7","unstructured":"N.\u00a0Bruin, K.\u00a0Doerksen. Electronic resources. http:\/\/www.cecm.sfu.ca\/~nbruin\/splitigusa\/, (2011). Accessed Septemeber 2022."},{"key":"9552_CR8","doi-asserted-by":"crossref","unstructured":"W.\u00a0Castryck, T.\u00a0Decru, Multiradical isogenies, in Arithmetic, geometry, cryptography, and coding theory 2021, volume 779 of Contemp. Math., pp. 57\u201389. Amer. Math. Soc., [Providence], RI (2022)","DOI":"10.1090\/conm\/779\/15671"},{"key":"9552_CR9","doi-asserted-by":"crossref","unstructured":"W.\u00a0Castryck, T.\u00a0Decru, An efficient key recovery attack on SIDH, in Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci. (Springer, Cham, 2023), pp. 423\u2013447","DOI":"10.1007\/978-3-031-30589-4_15"},{"key":"9552_CR10","doi-asserted-by":"crossref","unstructured":"W.\u00a0Castryck, T.\u00a0Decru, P.\u00a0Kutas, A.\u00a0Laval, C.\u00a0Petit, Y.\u00a0B. Ti. $$\\text{KLPT}^2$$: Algebraic pathfinding in dimension two and applications. Cryptology ePrint Archive, https:\/\/eprint.iacr.org\/2025\/372(Paper 2025\/372), 2025. To appear at CRYPTO (2025)","DOI":"10.1007\/978-3-032-01855-7_6"},{"issue":"1","key":"9552_CR11","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1515\/jmc-2019-0021","volume":"14","author":"W Castryck","year":"2020","unstructured":"W.\u00a0Castryck, T.\u00a0Decru, B.\u00a0Smith. Hash functions from superspecial genus-2 curves using Richelot isogenies. J. Math. Cryptol., 14(1), 268\u2013292, (2020)","journal-title":"J. Math. Cryptol."},{"key":"9552_CR12","first-page":"53","volume-title":"Groups and symmetries, volume 47 of CRM Proc. Lecture Notes","author":"DX Charles","year":"2009","unstructured":"D.\u00a0X. Charles, E.\u00a0Z. Goren, K.\u00a0E. Lauter. Families of Ramanujan graphs and quaternion algebras. In Groups and symmetries, volume\u00a047 of CRM Proc. , pages 53\u201380. Amer. Math. Soc., Providence, RI, (2009)"},{"issue":"1","key":"9552_CR13","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"D.\u00a0X. Charles, K.\u00a0E. Lauter, E.\u00a0Z. Goren. Cryptographic hash functions from expander graphs. J. Cryptology, 22(1), 93\u2013113, (2009)","journal-title":"J. Cryptology"},{"key":"9552_CR14","doi-asserted-by":"crossref","unstructured":"M.\u00a0Chen, A.\u00a0Leroux, L.\u00a0Panny, SCALLOP-HD: group action from 2-dimensional isogenies, in Public-Key Cryptography\u2014PKC 2024. Part III, volume 14603 of Lecture Notes in Comput. Sci. (Springer, Cham, 2024), pp. 190\u2013216","DOI":"10.1007\/978-3-031-57725-3_7"},{"key":"9552_CR15","doi-asserted-by":"crossref","unstructured":"M.\u00a0Corte-Real Santos, C.\u00a0Costello, S.\u00a0Frengley, An algorithm for efficient detection of $$(N,N)$$-splittings and its application to the isogeny problem in dimension 2, in Public-key cryptography\u2014PKC 2024. Part III, volume 14603 of Lecture Notes in Computer Science (Springer, Cham, 2024), pp. 157\u2013189","DOI":"10.1007\/978-3-031-57725-3_6"},{"key":"9552_CR16","doi-asserted-by":"crossref","unstructured":"M.\u00a0Corte-Real Santos, C.\u00a0Costello, J.\u00a0Shi, Accelerating the Delfs-Galbraith algorithm with fast subfield root detection, in Advances in cryptology\u2014CRYPTO 2022. Part III, volume 13509 of Lecture Notes in Comput. Sci. (Springer, Cham, 2022), pp. 285\u2013314","DOI":"10.1007\/978-3-031-15982-4_10"},{"key":"9552_CR17","doi-asserted-by":"crossref","unstructured":"C.\u00a0Costello, B.\u00a0Smith, The supersingular isogeny problem in genus 2 and beyond, in Post-quantum cryptography, volume 12100 of Lecture Notes in Comput. Sci. (Springer, Cham, 2020), pp. 151\u2013168","DOI":"10.1007\/978-3-030-44223-1_9"},{"key":"9552_CR18","unstructured":"D.\u00a0A. Cox, J.\u00a0Little, D.\u00a0O\u2019Shea. Ideals, varieties, and algorithms. Undergraduate Texts in Mathematics. Springer, (2015)"},{"key":"9552_CR19","doi-asserted-by":"crossref","unstructured":"P.\u00a0Dartois, A.\u00a0Leroux, D.\u00a0Robert, B.\u00a0Wesolowski, SQIsignHD: new dimensions in cryptography, in Advances in cryptology\u2014EUROCRYPT 2024. Part I, volume 14651 of Lecture Notes in Comput. Sci. (Springer, Cham, 2024), pp. 3\u201332","DOI":"10.1007\/978-3-031-58716-0_1"},{"key":"9552_CR20","doi-asserted-by":"crossref","unstructured":"L.\u00a0De\u00a0Feo, S.\u00a0Dobson, S.\u00a0D. Galbraith, L.\u00a0Zobernig, SIDH proof of knowledge, in Advances in cryptology\u2014ASIACRYPT 2022. Part II, volume 13792 of Lecture Notes in Comput. Sci. (Springer, Cham, 2023), pp. 310\u2013339","DOI":"10.1007\/978-3-031-22966-4_11"},{"issue":"2","key":"9552_CR21","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/s10623-014-0010-1","volume":"78","author":"C Delfs","year":"2016","unstructured":"C.\u00a0Delfs, S.\u00a0D. Galbraith. Computing isogenies between supersingular elliptic curves over $${\\mathbb{F}}_p$$. Des. Codes Cryptogr., 78(2), 425\u2013440, (2016)","journal-title":"Des. Codes Cryptogr."},{"issue":"1","key":"9552_CR22","first-page":"59","volume":"90","author":"P Deligne","year":"1994","unstructured":"P.\u00a0Deligne, G.\u00a0Pappas. Singularit\u00e9s des espaces de modules de Hilbert, en les caract\u00e9ristiques divisant le discriminant. Compositio Math., 90(1), 59\u201379, (1994)","journal-title":"Compositio Math."},{"key":"9552_CR23","unstructured":"M.\u00a0Djukanovi\u0107. Split Jacobians and Lower Bounds on Heights. PhD thesis, Leiden University and L\u2019Universit\u00e9 de Bordeaux, 11 2017. https:\/\/hdl.handle.net\/1887\/54944."},{"key":"9552_CR24","unstructured":"M.\u00a0Djukanovi\u0107. Families of (3,3)-split Jacobians. arXiv preprint, arXiv:1811.10075, (2018)"},{"issue":"10","key":"9552_CR25","doi-asserted-by":"publisher","first-page":"2297","DOI":"10.2140\/ant.2014.8.2297","volume":"8","author":"ND Elkies","year":"2014","unstructured":"N.\u00a0D. Elkies, A.\u00a0Kumar. K3 surfaces and equations for Hilbert modular surfaces. Algebra Number Theory, 8(10), 2297\u20132411, (2014)","journal-title":"Algebra Number Theory"},{"key":"9552_CR26","unstructured":"T.\u00a0Fisher. On families of 13-congruent elliptic curves. arXiv preprint, arXiv:1912.10777, (2019)"},{"key":"9552_CR27","unstructured":"T.\u00a0Fisher. On pairs of 17-congruent elliptic curves. arXiv preprint, arXiv:2106.02033, (2021)"},{"key":"9552_CR28","unstructured":"E.\u00a0Florit, B.\u00a0Smith, An atlas of the Richelot isogeny graph, in Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties, volume B90 of RIMS K\u00f4ky\u00fbroku Bessatsu, pp. 195\u2013219. Res. Inst. Math. Sci. (RIMS), Kyoto, (2022)"},{"key":"9552_CR29","doi-asserted-by":"crossref","unstructured":"E.\u00a0Florit, B.\u00a0Smith, Automorphisms and isogeny graphs of abelian varieties, with applications to the superspecial Richelot isogeny graph, in Arithmetic, geometry, cryptography, and coding theory 2021, volume 779 of Contemp. Math., pp. 103\u2013132. Amer. Math. Soc., [Providence], RI, (2022)","DOI":"10.1090\/conm\/779\/15672"},{"key":"9552_CR30","doi-asserted-by":"crossref","unstructured":"E.\u00a0V. Flynn, Y.\u00a0B. Ti, Genus two isogeny cryptography, in Post-quantum cryptography, volume 11505 of Lecture Notes in Comput. Sci. (Springer, Cham, 2019), pp. 286\u2013306","DOI":"10.1007\/978-3-030-25510-7_16"},{"key":"9552_CR31","doi-asserted-by":"crossref","unstructured":"D.\u00a0Freeman, K.\u00a0Lauter, Computing endomorphism rings of Jacobians of genus 2 curves over finite fields, in Algebraic geometry and its applications, volume\u00a05 of Ser. Number Theory Appl. (World Sci. Publ., Hackensack, NJ, 2008), pp. 29\u201366","DOI":"10.1142\/9789812793430_0002"},{"key":"9552_CR32","unstructured":"S.\u00a0Frengley. Explicit moduli spaces for curves of genus 1 and 2. PhD thesis, University of Cambridge, December (2023)"},{"issue":"2","key":"9552_CR33","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1142\/S1793042124500301","volume":"20","author":"S Frengley","year":"2024","unstructured":"S.\u00a0Frengley. On 12-congruences of elliptic curves. Int. J. Number Theory, 20(2), 565\u2013601, (2024)","journal-title":"Int. J. Number Theory"},{"key":"9552_CR34","doi-asserted-by":"crossref","unstructured":"G.\u00a0Frey, E.\u00a0Kani, Curves of genus $$2$$ covering elliptic curves and an arithmetical application, in Arithmetic algebraic geometry (Texel, 1989), volume\u00a089 of Progr. Math. (Birkh\u00e4user Boston, Boston, MA, 1991), pp. 153\u2013176","DOI":"10.1007\/978-1-4612-0457-2_7"},{"key":"9552_CR35","doi-asserted-by":"crossref","unstructured":"P.\u00a0Gaudry, \u00c9. Schost, On the invariants of the quotients of the Jacobian of a curve of genus 2, in Applied algebra, algebraic algorithms and error-correcting codes (Melbourne, 2001), volume 2227 of Lecture Notes in Comput. Sci. (Springer, Berlin, 2001), pp. 373\u2013386","DOI":"10.1007\/3-540-45624-4_39"},{"key":"9552_CR36","first-page":"19","volume":"53864","author":"EZ Goren","year":"2006","unstructured":"E.\u00a0Z. Goren, K.\u00a0E. Lauter. Evil primes and superspecial moduli. Int. Math. Res. Not., 53864, 19, (2006)","journal-title":"Int. Math. Res. Not."},{"key":"9552_CR37","doi-asserted-by":"crossref","unstructured":"E.\u00a0Z. Goren, J.\u00a0R. Love. Supersingular elliptic curves, quaternion algebras and applications to cryptography. arXiv preprint, arXiv:2410.06123, (2024). To appear in the proceedings of the Advanced Research Workshop: Isogeny based post-quantum cryptography.","DOI":"10.3233\/NICSP250005"},{"key":"9552_CR38","doi-asserted-by":"crossref","unstructured":"G.\u00a0Gruenewald, Computing Humbert surfaces and applications, in Arithmetic, geometry, cryptography and coding theory 2009, volume 521 of Contemp. Math. (Amer. Math. Soc., Providence, RI, 2010), pp. 59\u201369","DOI":"10.1090\/conm\/521\/10274"},{"key":"9552_CR39","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198571025.001.0001","volume-title":"Hilbert modular forms and Iwasawa theory","author":"H Hida","year":"2006","unstructured":"H.\u00a0Hida. Hilbert modular forms and Iwasawa theory. Oxford Mathematical Monographs. The Clarendon Press, Oxford University Press, Oxford, (2006)"},{"issue":"1","key":"9552_CR40","first-page":"37","volume":"91","author":"T Ibukiyama","year":"1994","unstructured":"T.\u00a0Ibukiyama, T.\u00a0Katsura. On the field of definition of superspecial polarized abelian varieties and type numbers. Compositio Math., 91(1), 37\u201346, (1994)","journal-title":"Compositio Math."},{"issue":"2","key":"9552_CR41","first-page":"127","volume":"57","author":"T Ibukiyama","year":"1986","unstructured":"T.\u00a0Ibukiyama, T.\u00a0Katsura, F.\u00a0Oort. Supersingular curves of genus two and class numbers. Compositio Math., 57(2), 127\u2013152, (1986)","journal-title":"Compositio Math."},{"issue":"72","key":"9552_CR42","doi-asserted-by":"publisher","first-page":"612","DOI":"10.2307\/1970233","volume":"2","author":"J Igusa","year":"1960","unstructured":"J.\u00a0Igusa. Arithmetic variety of moduli for genus two. Ann. of Math. (2), 72, 612\u2013649, (1960)","journal-title":"Ann. of Math."},{"key":"9552_CR43","doi-asserted-by":"publisher","first-page":"175","DOI":"10.2307\/2372812","volume":"84","author":"J Igusa","year":"1962","unstructured":"J.\u00a0Igusa. On Siegel modular forms of genus two. Amer. J. Math., 84, 175\u2013200, (1962)","journal-title":"Amer. J. Math."},{"key":"9552_CR44","unstructured":"B.\u00a0W. Jordan, Y.\u00a0Zaytman. Isogeny graphs of superspecial abelian varieties and generalized Brandt matrices. arXiv preprint, arXiv:2005.09031, (2020)"},{"key":"9552_CR45","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1112\/S1461157014000151","volume":"17","author":"D Kohel","year":"2014","unstructured":"D.\u00a0Kohel, K.\u00a0E. Lauter, C.\u00a0Petit, J.-P. Tignol. On the quaternion $$\\ell $$-isogeny path problem. LMS J. Comput. Math., 17, 418\u2013432, (2014)","journal-title":"LMS J. Comput. Math."},{"issue":"1","key":"9552_CR46","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1090\/S0002-9947-1988-0936803-3","volume":"307","author":"RM Kuhn","year":"1988","unstructured":"R.\u00a0M. Kuhn. Curves of genus $$2$$ with split Jacobian. Trans. Amer. Math. Soc., 307(1), 41\u201349, (1988)","journal-title":"Trans. Amer. Math. Soc."},{"key":"9552_CR47","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1186\/s40687-015-0042-9","volume":"2","author":"A Kumar","year":"2015","unstructured":"A.\u00a0Kumar. Hilbert modular surfaces for square discriminants and elliptic subfields of genus 2 function fields. Res. Math. Sci., 2:46, (2015)","journal-title":"Res. Math. Sci."},{"issue":"6","key":"9552_CR48","doi-asserted-by":"publisher","first-page":"1761","DOI":"10.1007\/s10623-024-01366-1","volume":"92","author":"S Kunzweiler","year":"2024","unstructured":"S.\u00a0Kunzweiler. Efficient computation of $$(2^n,2^n)$$-isogenies. Des. Codes Cryptogr., 92(6), 1761\u20131802, (2024)","journal-title":"Des. Codes Cryptogr."},{"key":"9552_CR49","doi-asserted-by":"crossref","unstructured":"J.\u00a0Love, D.\u00a0Boneh, Supersingular curves with small noninteger endomorphisms, in ANTS XIV\u2014Proceedings of the Fourteenth Algorithmic Number Theory Symposium, volume\u00a04 of Open Book Ser., pp. 7\u201322. Math. Sci. Publ., Berkeley, CA, (2020). Appendices available at https:\/\/arxiv.org\/abs\/1910.03180.","DOI":"10.2140\/obs.2020.4.7"},{"issue":"1","key":"9552_CR50","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/s40993-022-00407-9","volume":"9","author":"D Lubicz","year":"2023","unstructured":"D.\u00a0Lubicz, D.\u00a0Robert. Fast change of level and applications to isogenies. Res. Number Theory, 9(1):28, (2023)","journal-title":"Res. Number Theory"},{"issue":"3","key":"9552_CR51","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1515\/FORUM.2009.027","volume":"21","author":"K Magaard","year":"2009","unstructured":"K.\u00a0Magaard, T.\u00a0Shaska, H.\u00a0V\u00f6lklein. Genus 2 curves that admit a degree 5 map to an elliptic curve. Forum Math., 21(3), 547\u2013566, (2009)","journal-title":"Forum Math."},{"key":"9552_CR52","doi-asserted-by":"crossref","unstructured":"L.\u00a0Maino, C.\u00a0Martindale, L.\u00a0Panny, G.\u00a0Pope, B.\u00a0Wesolowski, A direct key recovery attack on SIDH. In Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci. (Springer, Cham, 2023), pp. 448\u2013471","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"9552_CR53","doi-asserted-by":"crossref","unstructured":"J.\u00a0Mestre, Construction de courbes de genre $$2$$ a partir de leurs modules, in Effective methods in algebraic geometry, volume\u00a094 of Progr. Math. (Springer, 1990), pp. 313\u2013334","DOI":"10.1007\/978-1-4612-0441-1_21"},{"key":"9552_CR54","unstructured":"M.-H. Nicole. Superspecial abelian varieties, theta series and the Jacquet\u2013Langlands correspondence. PhD thesis, McGill University, 2005. Available at https:\/\/escholarship.mcgill.ca\/concern\/theses\/f1881m434"},{"key":"9552_CR55","doi-asserted-by":"crossref","unstructured":"F.\u00a0Oort, A stratification of a moduli space of abelian varieties, in Moduli of abelian varieties (Texel Island, 1999), volume 195 of Progr. Math. (Birkh\u00e4user, Basel, 2001), pp. 345\u2013416","DOI":"10.1007\/978-3-0348-8303-0_13"},{"key":"9552_CR56","first-page":"388","volume-title":"Advances in cryptology\u2013EUROCRYPT 2024. Part VI, volume 14656 of Lecture Notes in Computer Science","author":"A Page","year":"2024","unstructured":"A.\u00a0Page, B.\u00a0Wesolowski. The supersingular endomorphism ring and one endomorphism problems are equivalent. In Advances in cryptology\u2014EUROCRYPT 2024. Part VI, volume 14656 of Lecture Notes in Computer Science, pages 388\u2013417. Springer, Cham, (2024)"},{"issue":"3","key":"9552_CR57","first-page":"255","volume":"36","author":"M Rapoport","year":"1978","unstructured":"M.\u00a0Rapoport. Compactifications de l\u2019espace de modules de Hilbert-Blumenthal. Compositio Math., 36(3), 255\u2013335, (1978)","journal-title":"Compositio Math."},{"key":"9552_CR58","doi-asserted-by":"crossref","unstructured":"D.\u00a0Robert, Breaking SIDH in polynomial time, in Advances in cryptology\u2014EUROCRYPT 2023. Part V, volume 14008 of Lecture Notes in Comput. Sci. (Springer, Cham, 2023), pp. 472\u2013503","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"9552_CR59","unstructured":"M.\u00a0Scott. A note on the calculation of some functions in finite fields: Tricks of the trade. Cryptology ePrint Archive, https:\/\/eprint.iacr.org\/2020\/1497(Paper 2020\/1497), (2020)"},{"issue":"5","key":"9552_CR60","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1006\/jsco.2001.0439","volume":"31","author":"T Shaska","year":"2001","unstructured":"T.\u00a0Shaska. Curves of genus 2 with $$(N,N)$$ decomposable Jacobians. J. Symbolic Comput., 31(5), 603\u2013617, (2001)","journal-title":"J. Symbolic Comput."},{"key":"9552_CR61","unstructured":"T.\u00a0Shaska. Curves of genus two covering elliptic curves. PhD thesis, University of Florida, (2001)"},{"issue":"2","key":"9552_CR62","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1515\/form.2004.013","volume":"16","author":"T Shaska","year":"2004","unstructured":"T.\u00a0Shaska. Genus 2 fields with degree 3 elliptic subfields. Forum Math., 16(2), 263\u2013280, (2004)","journal-title":"Forum Math."},{"key":"9552_CR63","doi-asserted-by":"crossref","unstructured":"T.\u00a0Shaska, H.\u00a0V\u00f6lklein, Elliptic subfields and automorphisms of genus 2 function fields, in Algebra, Arithmetic and Geometry with Applications (Springer, 2004), pp. 703\u2013723","DOI":"10.1007\/978-3-642-18487-1_42"},{"issue":"4","key":"9552_CR64","doi-asserted-by":"publisher","first-page":"307","DOI":"10.51286\/albjm\/1230370897","volume":"2","author":"T Shaska","year":"2008","unstructured":"T.\u00a0Shaska, G.\u00a0S. Wijesiri, S.\u00a0Wolf, L.\u00a0Woodland. Degree 4 coverings of elliptic curves by genus 2 curves. Albanian J. Math., 2(4), 307\u2013318, (2008)","journal-title":"Albanian J. Math."},{"key":"9552_CR65","doi-asserted-by":"crossref","unstructured":"J.\u00a0H. Silverman. The arithmetic of elliptic curves, volume 106 of Graduate Texts in Mathematics. Springer, Dordrecht, second edition, (2009)","DOI":"10.1007\/978-0-387-09494-6"},{"key":"9552_CR66","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1016\/j.jnt.2019.01.013","volume":"202","author":"C Springer","year":"2019","unstructured":"C.\u00a0Springer. Computing the endomorphism ring of an ordinary abelian surface over a finite field. Journal of Number Theory, 202, 430\u2013457, (2019)","journal-title":"Journal of Number Theory"},{"key":"9552_CR67","doi-asserted-by":"crossref","unstructured":"K.\u00a0Takashima, Efficient algorithms for isogeny sequences and their cryptographic applications, in Mathematical Modelling for Next-Generation Cryptography, volume\u00a029 of Math. Ind. (Tokyo) (Springer, Singapore, 2018), pp. 97\u2013114","DOI":"10.1007\/978-981-10-5065-7_6"},{"issue":"4","key":"9552_CR68","doi-asserted-by":"publisher","first-page":"789","DOI":"10.4134\/BKMS.2009.46.4.789","volume":"46","author":"K Takashima","year":"2009","unstructured":"K.\u00a0Takashima, R.\u00a0Yoshida. An algorithm for computing a sequence of Richelot isogenies. Bull. Korean Math. Soc., 46(4), 789\u2013802, (2009)","journal-title":"Bull. Korean Math. Soc."},{"key":"9552_CR69","volume-title":"Hilbert modular surfaces. Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)]","author":"G van der Geer","year":"1988","unstructured":"G.\u00a0van\u00a0der Geer. Hilbert modular surfaces, volume\u00a016 of Ergebnisse der Mathematik und ihrer Grenzgebiete (3) [Results in Mathematics and Related Areas (3)]. Springer-Verlag, Berlin, (1988)"},{"issue":"1","key":"9552_CR70","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/PL00003816","volume":"12","author":"PC van Oorschot","year":"1999","unstructured":"P.\u00a0C. van Oorschot, M.\u00a0J. Wiener. Parallel collision search with cryptanalytic applications. J. Cryptology, 12(1), 1\u201328, (1999)","journal-title":"J. Cryptology"},{"key":"9552_CR71","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-56694-4","volume-title":"Quaternion algebras. Graduate Texts in Mathematics","author":"J Voight","year":"2021","unstructured":"J.\u00a0Voight. Quaternion algebras, volume 288 of Graduate Texts in Mathematics. Springer, Cham, (2021)"},{"key":"9552_CR72","doi-asserted-by":"crossref","unstructured":"B.\u00a0Wesolowski, The supersingular isogeny path and endomorphism ring problems are equivalent, in 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science\u2014FOCS 2021 (IEEE Computer Society, Los Alamitos, CA, 2022), pp. 1100\u20131111","DOI":"10.1109\/FOCS52979.2021.00109"}],"container-title":["Journal of Cryptology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09552-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00145-025-09552-7","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00145-025-09552-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T20:00:00Z","timestamp":1770840000000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00145-025-09552-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,4]]},"references-count":72,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,1]]}},"alternative-id":["9552"],"URL":"https:\/\/doi.org\/10.1007\/s00145-025-09552-7","relation":{},"ISSN":["0933-2790","1432-1378"],"issn-type":[{"value":"0933-2790","type":"print"},{"value":"1432-1378","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,4]]},"assertion":[{"value":"17 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 November 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"2"}}