Craig CostelloHüseyin HişilCostello, CraigHisil, HuseyinT. Takagi , T. Peyrin2025-10-0620179789819698936, 9789819698042, 9789819698110, 9789819698905, 9789819512324, 9783032026019, 9783032008909, 9783031915802, 9789819698141, 9783031984136978331970696216113349, 030297430302-974310.1007/978-3-319-70697-9_112-s2.0-85037841886https://www.scopus.com/inward/record.uri?eid=2-s2.0-85037841886&doi=10.1007%2F978-3-319-70697-9_11&partnerID=40&md5=48f8f4037d5f750f4350dbec5b6b00bdhttps://gcris.yasar.edu.tr/handle/123456789/9717https://doi.org/10.1007/978-3-319-70697-9_11We derive a new formula for computing arbitrary odd-degree isogenies between elliptic curves in Montgomery form. The formula lends itself to a simple and compact algorithm that can efficiently compute any low odd-degree isogenies inside the supersingular isogeny Diffie-Hellman (SIDH) key exchange protocol. Our implementation of this algorithm shows that beyond the commonly used 3-isogenies there is a moderate degradation in relative performance of (2d+ 1) -isogenies as d grows but that larger values of d can now be used in practical SIDH implementations. We further show that the proposed algorithm can be used to both compute isogenies of curves and evaluate isogenies at points unifying the two main types of functions needed for isogeny-based public-key cryptography. Together these results open the door for practical SIDH on a much wider class of curves and allow for simplified SIDH implementations that only need to call one general-purpose function inside the fundamental computation of the large degree secret isogenies. As an additional contribution we also give new explicit formulas for 3- and 4-isogenies and show that these give immediate speedups when substituted into pre-existing SIDH libraries. © 2017 Elsevier B.V. All rights reserved.Englishinfo:eu-repo/semantics/closedAccessIsogeny-based Cryptography, Montgomery Curves, Post-quantum Cryptography, Sidh, Computation Theory, Public Key Cryptography, Quantum Cryptography, Security Of Data, Arbitrary Degree, Diffie Hellman, Explicit Formula, Key Exchange Protocols, Montgomery, Post Quantum Cryptography, Relative Performance, Sidh, CryptographyComputation theory, Public key cryptography, Quantum cryptography, Security of data, Arbitrary degree, Diffie Hellman, Explicit formula, Key exchange protocols, Montgomery, Post quantum cryptography, Relative performance, SIDH, CryptographyIsogeny-Based CryptographyMontgomery CurvesPost-Quantum CryptographySIDHA simple and compact algorithm for sidh with arbitrary degree isogeniesConference Object