Mathematics of Isogeny Based Cryptography.
arXiv: Cryptography and Security(2017)
摘要
These lectures notes were written for a summer school on Mathematics for post-quantum cryptography in Thi`es, Senegal. They try to provide a guide for Mastersu0027 students to get through the vast literature on elliptic curves, without getting lost on their way to learning isogeny based cryptography. They are by no means a reference text on the theory of elliptic curves, nor on cryptography; students are encouraged to complement these notes with some of the books recommended in the bibliography. presentation is divided in three parts, roughly corresponding to the three lectures given. In an effort to keep the reader interested, each part alternates between the fundamental theory of elliptic curves, and applications in cryptography. We often prefer to have the main ideas flow smoothly, rather than having a rigorous presentation as one would have in a more classical book. The reader will excuse us for the inaccuracies and the omissions.
更多查看译文
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络