-
arXiv:1208.5370 [pdf, ps, other]
Isogeny volcanoes
Abstract: The remarkable structure and computationally explicit form of isogeny graphs of elliptic curves over a finite field has made them an important tool for computational number theorists and practitioners of elliptic curve cryptography. This expository paper recounts the theory behind these graphs and examines several recently developed algorithms that realize substantial (often dramatic) performance… ▽ More
Submitted 7 May, 2013; v1 submitted 27 August, 2012; originally announced August 2012.
Comments: Invited ANTS X paper, minor edits, 18 pages
MSC Class: 11G07; 11Y16 (Primary) 11G15; 11G20 (Secondary)
Journal ref: ANTS X: Proceedings of the Tenth Algorithmic Number Theory Symposium, 2012, 507-530
-
arXiv:1202.3985 [pdf, ps, other]
On the evaluation of modular polynomials
Abstract: We present two algorithms that, given a prime ell and an elliptic curve E/Fq, directly compute the polynomial Phi_ell(j(E),Y) in Fq[Y] whose roots are the j-invariants of the elliptic curves that are ell-isogenous to E. We do not assume that the modular polynomial Phi_ell(X,Y) is given. The algorithms may be adapted to handle other types of modular polynomials, and we consider applications to poin… ▽ More
Submitted 13 October, 2014; v1 submitted 17 February, 2012; originally announced February 2012.
Comments: 19 pages, corrected a typo in equation (8) and added equation (9)
MSC Class: 11G07 (Primary) 11Y16; 14H52; 11G15 (Secondary)
Journal ref: Proceedings of the Tenth Algorithmic Number Theory Symposium (ANTS X), Open Book Series 1, Mathematical Sciences Publishers, 2013, 531-555
-
A low-memory algorithm for finding short product representations in finite groups
Abstract: We describe a space-efficient algorithm for solving a generalization of the subset sum problem in a finite group G, using a Pollard-rho approach. Given an element z and a sequence of elements S, our algorithm attempts to find a subsequence of S whose product in G is equal to z. For a random sequence S of length d log_2 n, where n=#G and d >= 2 is a constant, we find that its expected running time… ▽ More
Submitted 3 January, 2011; originally announced January 2011.
Comments: 12 pages
Journal ref: Designs Codes and Cryptography 63 (2012), 1-13