Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Overview of Elliptic Curve Isogenies Based Public Key Cryptography Assumptions

Simons Institute via YouTube

Overview

Explore the foundations of elliptic curve isogenies in public key cryptography with David Jao from the University of Waterloo in this 43-minute lecture. Delve into the history and core concepts of elliptic curves, finite subgroups, and their applications in cryptographic systems. Examine the Supersingular Isogeny Diffie-Hellman (SIDH) and Isogeny-based Cryptographic Random Self-reducible Assumption (ICRSA) protocols. Investigate quantum cryptanalysis techniques, including the Quantum Fourier Transform and lattice approaches, as they relate to post-quantum cryptography. Gain insights into the random case scenario and control mechanisms within this advanced cryptographic framework.

Syllabus

Intro
What are elliptic curves
History
Venn Diagram
Examples
Finite Subgroup
SIDHI
CRS
Algorithm
Quantum Fourier Transform
Random Case
Control Not
Lattice Approach

Taught by

Simons Institute

Reviews

Start your review of Overview of Elliptic Curve Isogenies Based Public Key Cryptography Assumptions

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.