<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <article-id pub-id-type="doi">10.1007/978-3-030-34621-8_10</article-id>
      <title-group>
        <article-title>CSIKE-ENC Combined Encryption Scheme with Optimized Degrees of Isogeny Distribution</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Anatoliy Bessalov</string-name>
          <email>a.bessalov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Sergey Abramov</string-name>
          <email>s.abramov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Sokolov</string-name>
          <email>v.sokolov@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nataliia Mazur</string-name>
          <email>n.mazur@kubg.edu.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Borys Grinchenko Kyiv University</institution>
          ,
          <addr-line>18/2, Bulvarno-Kudryavska str., Kyiv, 04053</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
      </contrib-group>
      <fpage>36</fpage>
      <lpage>45</lpage>
      <abstract>
        <p>For the PQC CSIDH and CSIKE algorithms, the advantages of two classes of quadratic and twisted supersingular Edwards curves over complete Edwards curves are justified. These classes form pairs of quadratic twist curves with order p + 1 ≡ 0mod8 over the prime field Fp and double the space of all curves in the algorithms. The randomized algorithms CSIDH and CSIKE are presented. An analysis of the degrees lk isogenies distribution is given, and an optimal distribution within the given conditions is proposed with the degree lmax = 397 instead of lmax = 587 while maintaining the number K = 74 of all degrees. A probabilistic analysis of random odd order points R was carried out, probability estimates are obtained, and it is recommended to avoid isogenies with small values of the degrees lk in algorithms. The features of the CSIKE algorithm with one public key of Bob in the problem of encapsulation by Alice of the secret key κ, which Bob calculates at the stage of decapsulation with his secret key, are considered. A CSIKE-ENC scheme for combined encryption of the key κ and message M based on two asymmetric algorithms CSIDH and CSIKE with Alice's authentication and the wellknown symmetric message encryption standard is proposed. The security aspects of the scheme are discussed.</p>
      </abstract>
      <kwd-group>
        <kwd>1 CSIKE</kwd>
        <kwd>CSIKE-ENC</kwd>
        <kwd>curve in generalized Edwards form</kwd>
        <kwd>complete Edwards curve</kwd>
        <kwd>twisted Edwards curve</kwd>
        <kwd>quadratic Edwards curve</kwd>
        <kwd>supersingular Edwards curve</kwd>
        <kwd>curve order</kwd>
        <kwd>point order</kwd>
        <kwd>isogeny</kwd>
        <kwd>isomorphism</kwd>
        <kwd>class-group action</kwd>
        <kwd>w-coordinates</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>One of the most promising PQC algorithms,
which has generated a wide stream of scientific
articles, is the CSIDH algorithm [1]. It solves the
problem of non-interactive Diffie-Hellman secret
sharing based on the construction of chains of
isogenic supersingular elliptic curves with the set
{  } of K small odd prime degrees   isogenies
over the prime field   . The binary length log p of
the modulus p of the field determines the length of
the key in the algorithm and the (log p)/2 security
levels for attacks on a classical computer and (log
p)/4 on a quantum computer (the notation “log”
refers to the base-2 logarithm). The CSIDH
algorithm has the smallest key length among
known PQC algorithms.</p>
      <p>This paper continues and develops the results
of the previous one [2] in the problem of CSIKE
key encapsulation with authentication and
combined encryption by asymmetric and
symmetric algorithms.</p>
      <p>
        The first implementations of CSIDH were
based on fast supersingular curves in the
Montgomery form [1], but soon in [3–5] using the
W: Z-coordinates of curves in the Edwards form,
it was possible to obtain a gain of 20% in
comparison with [1] in the computation speed.
Further, generalizing the formulas for calculating
isogenies for Edwards curves [
        <xref ref-type="bibr" rid="ref1">6</xref>
        ] to twisted
Edwards curves in [7], we illustrated the
implementation of CSIDH models on quadratic
and twisted Edwards curves [
        <xref ref-type="bibr" rid="ref3 ref4">2, 7, 9, 10</xref>
        ]. The last
curves were first defined in the fundamental work
[
        <xref ref-type="bibr" rid="ref5">11</xref>
        ], but with unfortunate terminology, so we use
the classification of curves in the Edwards form
[
        <xref ref-type="bibr" rid="ref6 ref7">12, 13</xref>
        ]. An analysis of the properties of
supersingular Edwards curves of all classes is
given in [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref8 ref9">14–18</xref>
        ].
      </p>
      <p>
        In most works related to the CSIDH algorithm,
various variants of “constant time CSIDH” are
proposed to counteract the
well-known side
channel attack [
        <xref ref-type="bibr" rid="ref13 ref14">19, 20</xref>
        ]. In [
        <xref ref-type="bibr" rid="ref4">10</xref>
        ], we proposed an
alternative approach to solving the problem—
randomization of the CSIDH algorithm. It also
simplifies and speeds up the procedure for
selecting random points and is used in this paper
(Sections 2, 4).
      </p>
      <p>
        As is known, one of the candidates for the
NIST standardization process of PQC algorithms
is SIKE [
        <xref ref-type="bibr" rid="ref15">21</xref>
        ]. This fact indicates its preference for
the SIDH algorithm. In [2], we proposed a simple
version of CSIKE as an original modification of
CSIDH. It can be confidently stated that CSIDH
and СSIKE provide a much simpler and more
efficient implementation of solving the same
problem as SIKE. Instead of the extended field
  2 in SIKE, the prime field 

arithmetic is
significantly faster and halves the length of field
elements and keys. A remarkable property of
algorithms
appears—the
commutativity
of
isogenic mappings. The comparative simplicity of
CSIDH and СSIKE is confirmed by the possibility
to illustrate their work with examples within one
paper [
        <xref ref-type="bibr" rid="ref3 ref4">2, 7, 9, 10</xref>
        ]. An important modification of
our algorithm
implementation
models is the
refusal to calculate the isogenic functions φ(R) of
a random point R, which makes the algorithm
sufficiently fast. Note
also that the
      </p>
      <p>
        CSIKE
algorithm [2] is much simpler and more efficient
than the CSIDH-KEM schemes [
        <xref ref-type="bibr" rid="ref16 ref17">22, 23</xref>
        ], which
offer
      </p>
      <p>ElGamal-like
public
key
encryption
algorithms. In this paper, we analyze and optimize
the important parameters of the CSIDH
and
the maximum degree of isogenies is  
This drastically simplifies and speeds up the</p>
      <p>Probabilistic analysis of random
points of maximum odd order n is given, and
recommendations
are
given
on the rational
distribution of degrees   isogenies in a dense set</p>
      <p>of size K. Section 4 proposes an original
messages encryption with Alice’s authentication,
security aspects are discussed, in addition to
examples 1 and 2 [2], an example of calculations
by Alice and Bob of simulated inserts according
to the CSIDH algorithm is given.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Definitions in Classes of Elliptic</title>
    </sec>
    <sec id="sec-3">
      <title>Curves in the Edwards Form</title>
      <p>The elliptic curve   ,
generalized</p>
      <p>
        For the first time, such a curve was proposed
in [
        <xref ref-type="bibr" rid="ref5">11</xref>
        ] with the coefficient a at  2and the term
“twisted Edwards curves”. For the correct division
of curves in the
      </p>
      <sec id="sec-3-1">
        <title>Edwards form into nonintersecting classes, we use our classification [12].</title>
        <p>
          If the quadratic character χ(ad) = −1, curve (1)
is isomorphic to the complete Edwards curve [
          <xref ref-type="bibr" rid="ref5">11</xref>
          ]
with one parameter d
  :  2 +  2 = 1 +   2 2,  ( ) = −1
        </p>
        <p>The existence condition of SEC of this class is
 ≡ 3</p>
      </sec>
      <sec id="sec-3-2">
        <title>4. Curve (2) is cyclic.</title>
        <p>
          Another case χ(ad) = 1 generates 2 classes of
non-cyclic curves: quadratic and twisted Edwards
curves. In particular, if χ(a) = χ(d) = 1, curve (1)
is isomorphic to the quadratic Edwards curve [
          <xref ref-type="bibr" rid="ref6">12</xref>
          ]
  :  2 +  2 = 1 +   2 2,
 ( ) = 1,    ≠ 1.
(1)
(2)
(3)
        </p>
        <p>Here, in contrast to (2), the parameter d is a
square. For both curves (2) and (3) usually take</p>
        <p>
          The twisted Edwards curve is defined in [
          <xref ref-type="bibr" rid="ref6">12</xref>
          ]
as a special case of the curve (1) with conditions 
χ(a) = χ(d) = −1. The introduction of the second
parameter a into equation (1) in the pioneering
work [
          <xref ref-type="bibr" rid="ref5">11</xref>
          ] is necessary only for these conditions.
        </p>
        <p>
          In [
          <xref ref-type="bibr" rid="ref5">11</xref>
          ], curve (3) together with curve (2) are
called Edwards curves. At the same time, their
properties and structure Differ radically [
          <xref ref-type="bibr" rid="ref6 ref7">12, 13</xref>
          ].
The controversial terminology in [
          <xref ref-type="bibr" rid="ref5">11</xref>
          ] sometimes
leads to misunderstandings and errors in scientific
articles [
          <xref ref-type="bibr" rid="ref2">8</xref>
          ], which is discussed in [
          <xref ref-type="bibr" rid="ref3">9</xref>
          ]. In the last
paper, in particular, the following theorem is
proved.
        </p>
        <p>
          Theorem 2 [
          <xref ref-type="bibr" rid="ref3">9</xref>
          ]. For a curve   , (1) in the
generalized Edwards form
over a prime field   , there is a unique
 with parameters
quadratic twist curve   ⃗ ,
 ̄ =  ,  ̄ =  ,   ∈   ∗.
        </p>
        <p>
          Its proof is given in [
          <xref ref-type="bibr" rid="ref3">9</xref>
          ]. From it, in particular,
it follows that in the class of complete Edwards
curves (2) the quadratic twist curve    =   −1
lies inside this class, while for the quadratic curve
(3) the
quadratic twist is a twisted
curve
   ,
        </p>
        <p>=   , ,  ( ) = −1. Each of the 3 classes
contains equal sets (p−3)/2 curves (d ≠ 0, ±1).
Then the replacement of the class of complete</p>
      </sec>
      <sec id="sec-3-3">
        <title>Edwards curves by 2 classes of non-cyclic Edwards curves doubles the space of pairs of quadratic twist curves in the CSIDH algorithm.</title>
        <p>We define a quadratic and twisted Edwards
curve as a pair of quadratic twists with parameters
 (</p>
        <p>) = 1,  ̅ =  ,  ̅=  ,   ( ) = −1. Since
SEC exist only for  ≡ 3</p>
        <p>
          4 [
          <xref ref-type="bibr" rid="ref8">14</xref>
          ], we can
take  = −1,  ̅ = − = −1,  ̅= − ,
where
        </p>
        <p>= 1,  are the quadratic curve (3) parameters,
respectively,  ̅,  ̅are twisted curve parameters. In
other words, the transition from quadratic to
twisted curve and vice versa can be defined as
  =  1,</p>
        <p>↔  −1,− . Then the twisted SEC
equation from (1) can be written as
 −1,− :</p>
        <p>2 −  2 = 1 −   2 2,
 ∈   ∗,     ≠ 1,   ( ) = 1.
(4)</p>
        <p>The order of quadratic (3) and twisted (4) SEC
  = p+1  0mod8, then p  −1
that equation (4), like equation (3), has a fixed
parameter  = −1, after which all curves (4) are
determined by one parameter (− ). Quadratic
residues  = 1</p>
        <p>of the curve (3) become
quadratic non-residues  = −1 
(− ) of the
curve (4). This simplifies the illustration of how
8 [2]. Note
the CSIDH algorithm works.</p>
        <p>
          Quadratic and twisted SEC as a pair of
quadratic twists have the same order  + 1, but a
different structure. Except for the two points
(0, ±1), all their points are different, so isogenies
of the same degree have different kernels and are
calculated independently. Both curves are
noncyclic concerning points of even order (contain 3
points of the 2nd order each, two of which are
singular
points
 1,2 = (±√
, ∞)
[
          <xref ref-type="bibr" rid="ref6">12</xref>
          ]).
1.
all
2.
        </p>
        <p>Quadratic SEC, in addition, contains 2 singular
points of the 4th order ± 1 = (∞, ± 1
). The
presence of 3 points of the 2nd order limits the
number 8 to the minimum even cofactor of the
√
order</p>
        <p>
          = 8 (n-odd) of twisted and quadratic
Edwards curves [
          <xref ref-type="bibr" rid="ref6">12</xref>
          ]. The maximum points order
of these curves is   /2. Points of even orders
mustn't be involved in the calculation of Scalar
Multiplication (SM) of the CSIDH algorithm (the
first multiplication by 4 of a random point P gives
a random point R of odd order n or a divisor of n).
        </p>
        <p>
          The choice of 2 classes of non-cyclic SEС for
the CSIDH algorithm in our works [
          <xref ref-type="bibr" rid="ref3 ref4">2, 7, 9, 10</xref>
          ] is
justified by their advantages over complete SEС:
        </p>
        <p>The number of all quadratic and twisted
Edwards curves ( − 3) is twice the number of
complete
corresponding proportion is also valid for the
number of isogenic SEC and, as a result, for
the security of CSIDH.</p>
        <p>The transition to the quadratic twist curve
↔  −1,−</p>
        <p>does not require the laborious
inversion of the parameter  ↔  −1 required
for a complete SEC.</p>
        <p>
          Among isogenic curves (with
different
J-invariants) there are also isomorphic curves
with equal J-invariants [
          <xref ref-type="bibr" rid="ref18 ref5">11, 24</xref>
          ]
 ( ,  ) =
16( 2 +  2 + 14 )
        </p>
        <p>3
 ( −  )4
This</p>
        <p>
          parameter, in particular, recognizes
isomorphic
consider its randomized modification [
          <xref ref-type="bibr" rid="ref4">2, 10</xref>
          ] and
discuss the problem of choosing isogeny degrees.
        </p>
        <p>The PQC CSIDH algorithm was proposed by
the authors of [1]. It is based on the CGA
(classgroup action) function over a prime field   . The
CGA function defines an isogenic mapping  of
a supersingular
elliptic
curve E
of
order
=  + 1 into a curve  ′ =  ∗  of the same
in [1] specifies the least isogeny degrees   ,k = 1,   = ( 1,  2, . . .   ).
≤   ≤  ], 
= 5.   =   , where
order of the form  = [ 1 1,  2 2, . . ,  
are odd prime degrees of isogenies and   are
exponents
(number
of
isogenic
transitions). This mapping is commutative.</p>
        <p>The implementation of the CSIDH algorithm
2,..., K, K = 74,   = 587, as well as an interval of
11
exponent</p>
        <p>values [−
Negative exponents mean the transition to a
quadratic twist curve. Such parameters lead to a
key length in CSIDH of 512 bits and a security
level of 128 bits for quantum computer attacks.</p>
      </sec>
      <sec id="sec-3-4">
        <title>Instead</title>
        <p>
          of
supersingular
curves
in
the
Montgomery form [1] and complete Edwards
curves [3], in [
          <xref ref-type="bibr" rid="ref3 ref4">2, 7, 9, 10</xref>
          ] we substantiate the
advantages and build CSIDH models on noncyclic
quadratic and twisted
SEC, which form the
quadratic twist pairs. They are of the order
modulus of a prime field is 
≡ −1 
8.
 
= 8
=  + 1,,  =
        </p>
        <p>∏ =1   , while the
1.
  ,
1,  
2.</p>
        <p>Choice of parameters. For odd primes
compute  =</p>
        <p>∏ =1  
,
appropriate field modulus  = 2
select the</p>
        <p>∏ =1   −
≥ 3 and start the elliptic curve   .</p>
        <p>Public keys Calculation. Alice and Bob
use secret keys in the form
of vectors
  ,В = ( 1,  2, . . ,   )
construct
isogenic
maps   ,В = [ 1 1,  2 2, . . ,     ] and calculate
the isogenic curves   ,В =   ,В ∗  0as their
public keys. These curves are determined by
their parameters up to isomorphism.</p>
        <p>Key exchange. Here the protocol is
similar to item 2 with the replacement of
 0 →   for Alice and  0 →  
Knowing Bob’s public key, Alice calculates
for Bob.
=   ∗  
=     ∗  0.</p>
        <p>Similar
actions Bob gives the result  
=   ∗   =
  ∗   ∗  0, which coincides with the first
one due to the commutativity of the group
operation.</p>
        <p>The</p>
        <p>J-invariant of the
curve
  В ( ВА). is taken as a shared secret.</p>
        <p>For each function Θ there is a multiplicatively
inverse

, such
that
 ∗  =  ,
where
 = [1, 1, 1, , . . . , 1] is the neutral element of
CGA (K-dimensional vector of units). The
our key encapsulation algorithm.
mapping  is constructed by inverting the signs of
all exponents   of the mapping . It is used in</p>
        <p>
          Below we present a randomized modification
of Alice’s calculation algorithm according to
Section 2 of [
          <xref ref-type="bibr" rid="ref4">10</xref>
          ] using isogenies of quadratic and
twisted SEC.
        </p>
        <p>Randomized algorithm 1: Evaluating CGA
function on quadratic and twisted SEC.</p>
        <p>Input:   ∈   ,  ( ) = 1 and a list of integers
Output:</p>
        <p>such that [ 1 1,  2 2, . . .     ] ∗
  , :  2 +  2 = 1 +  А,В 2 2, 
 0 =
∏ ∈ 0   ,</p>
        <p>1 = ∏ ∈ 1   ,
2. While some   ≠ 0 do
1. Let  0 = { |  &gt; 0} ,  1 = { |  &lt; 0},
3. Sample a random  ∈   ,
4. Sеt  ← 1,   ← 0,
  :  2 +  2 = 1 +    2 2
If  (( 2 − 1)/(  2 − 1) = 1,
5. Else a  −1,   1
  :  2 −  2 = 1 −    2 2,
6. Compute 
 = ( ,  ) ∈   ,
7. Compute 
9. Compute 
10. If
8. Sample a random   |
∈   ,
← [( + 1)/2  ] ,
← [  /  ] ,</p>
        <p>-coordinate of the point
 ≠ (1,0)
computes
kernel
 of   - isogeny  :   →   ,
11. Else start over to line 3,
12. Compute   of

 ←</p>
        <p>−  ,
13. Skip 
If   = 0,
14. Return А.</p>
        <p>curve   ,   ←   ,
in   and set   ← (  /  )</p>
        <p>This algorithm has important differences from
the original algorithm 2 [1], which are discussed
in [2]. In addition to modifications related to the
randomization method of the CSIDH algorithm,
here we refuse the redundant isogenic function
φ(R) of a random point R, which radically speeds
up the algorithm.</p>
        <p>At the beginning of Algorithm 1, two subsets
together with two factors  0

  , λ = 0,1, with degree   numbers  , are formed,
 1 of the
number  =  0 1 (the index λ = 0 (  &gt; 0)
corresponds to the choice of a quadratic SEC, and
λ = 1–to the choice twisted SEC (  &lt; 0)). Since
the order of the curve is p+1 = 8n, then in step 7
of the algorithm for the curve  
R = 4 1 of odd order  0, is calculated, and for
the curve  −1,− the point 
= 4 0 of odd order
 1 is calculated. This minimizes the cost of the
following scalar multiplication, which determines
the point Q of the isogeny kernel of the degree  
(Step 9). Further, in step 10 of the algorithm, by
the point
doubling
the
points,  = (
 − 1)/2 of
xcoordinates of the kernel &lt;Q&gt; points are
calculated.</p>
        <p>
          In step 7 of Algorithm 1, double doubling the
random point P immediately allows you to get rid
of points of even order (including singular points
of the 2nd and 4th order) and then the calculation of
scalar multiplications in subgroups of odd order
points are performed. Their task is to find (  −1) of
x-coordinates  of the kernel &lt;Q&gt; points of prime
order   . As a result, according to the formula [
          <xref ref-type="bibr" rid="ref1">6</xref>
          ]
2
participate in this version of CSIKE. The analyst
does not have any information about the key κ to
organize the attack, which inevitably increases the
security of the algorithm. The work [2] gives 2
examples of the operation of the four-isogenies
        </p>
      </sec>
      <sec id="sec-3-5">
        <title>CSIKE</title>
        <p>model with classical and randomized
implementation. In</p>
      </sec>
      <sec id="sec-3-6">
        <title>Section 4, along with a modification of</title>
      </sec>
      <sec id="sec-3-7">
        <title>CSIKE in continuation of</title>
        <p>Example 2 [2], we will illustrate Alice’s and
Bob’s calculations to authenticate Alice.
(6)</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Analysis and Optimization of</title>
      <p>′ =    8,  = ∏

 =1   ,
s = (</p>
      <p>− 1)/2
intensive
redundant.
the parameter  ′ of the   -isogenic quadratic SEC
is calculated. Twisted SEC parameters (4) а′ =
−1,  ′→ −  ′. We emphasize that the concept of
CSIDH is the construction of chains of isogenic
curves as</p>
      <sec id="sec-4-1">
        <title>Abelian</title>
        <p>groups, and
not isogenic
functions φ(R) of a random point R. The
laborcalculations of the latter [1] are</p>
        <p>In our previous work [2], we proposed the
original CSIKE algorithm as a modification of
CSIDH. It is an algorithm for encapsulating the
key κ as a shared secret between Alice and Bob
(Commutative</p>
      </sec>
      <sec id="sec-4-2">
        <title>Supersingular</title>
        <p>1.
 
2.</p>
        <p>Key κ
generation</p>
        <p>Alice
generates
random exponents 
integers
and</p>
        <p>finds
= ( 1,  2, . . ,   ),,
function
 [-m…m] of small
the
builds
secret
the
  ]
vector
CGA
and
 
whose parameter   is taken as 
calculates the isogenic curve   =   ∗  0,</p>
        <p>Key encapsulation. This is the procedure
for Alice to encrypt the key with Bob’s public
key   To do this, Alice calculates the isogenic
this curve is sent to Bob.
curve   ∗  
=    . The   
parameter of
3.</p>
        <p>Key decapsulation. Bob’s decryption of
the curve</p>
        <p>with his secret key (−  )
reduces to his calculation of the isogenic curve
inverse secret key:   → (−  ).
inverse function   is using Bob’s additively
So Alice and Bob have a shared secret κ
instead of a shared secret   В in CSIDH. Usually,
these parameters are replaced by the J-invariant
(5), which is the same for isomorphic curves.
Alice’s private and public keys do not yet</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>CSIDH and CSIKE Parameters</title>
      <p>Below,
we
analyze
and
optimize
the
distributions of isogeny degrees {  } and perform
a statistical analysis of a good choice of a random
point.
with value 
We found that 74 degrees {  } isogenies in [1]
= 587 runs through only a
fraction of all primes from 3 to 587, the total
number of which is 106. In other words, 32 values
of primes are not included in the list of degrees
{  } in the model [1], which means gaps in the set
of all primes {  }. Such gaps reduce the product of
all   , and form a reserve for its increase.</p>
      <p>Let us pose the problem of analyzing possible
distributions of sets of primes {  }
options for optimizing this distribution. According
to the table of primes up to 587, the complete
 of size K to find
= {3, 5, 7, …, 587}contains N = 106

set = {  }
of all primes.</p>
      <p>Any segment of length K of the complete set
 of primes ordered in ascending order gives

the product ∏ =1   = М( 1,  ). Removing one of
the extreme elements  1 or   reduces the value of
M and  </p>
      <p>− 1, but retains the segment density
property (without gaps). Removing the element  
from the middle of the segment (1&lt;k&lt;K) also
reduces the value of M and  
− 1, but violates
the density property (with a gap). Let us call an
ascending set of primes {  } optimal if for known
=  1 and K this set is dense. The optimal set
the
following
property:
product


has</p>
      <p>∏ =1  
= М( 1,  ) = 
.</p>
      <p>Comment. In the product   , we take the
removed element   1. It is clear that such a
replacement reduces the product by a factor  
with the same K. In this sense, we write down the
above maximization property. When removing
the extreme elements of the segment, the property
is
preserved
for
the
shortened
segment
{ 2,..,  } −1 or { 1 ,…,  −1} −1.


our
the
set
= {  }106 = {3, 5, 7, … , 587}106is optimal by
definition. Removing 32 numbers from it in the
middle gives the set {  }
 =74, which is far from
optimal. The concept of optimality is associated
maximizing the product of
exclusively</p>
      <p>with
elements of a set.</p>
      <p>Let
= {  }
us
divide
the
Lh = {  } ℎ, ℎ = 1. .6, including prime numbers
in hundreds of natural numbers with numbers h.
For the first hundred numbers, for example, we
have the optimal subset  1 = {3, 5, 7, . . , 97} 1,
where  1 = 24. For all 6 optimal subsets Lh,
these numbers  ℎ are given in the second row of
Distribution of quantities  ℎ of primes and their
products  ℎ within hundreds of natural numbers
with numbers h (rounded to whole bits)
1
24
95
2
21
45
3
16
23
4
16
92
119.7
bits (log to base 2). For all products of numbers
{  } in subsets, we calculate the bit length
 ℎ =
∑ 
  ∈ ℎ
(  ),
4
∑ℎ=1  ℎ
the values of which are given in the 3rd row of
conclusions. Firstly, the sum of all bits of the 3rd
row</p>
      <p>6
∑ℎ=0  ℎ = 792.772 = 793
determines the product of all 106 prime numbers
{3,…,587}, has
a redundancy
of
283
bits
compared to the minimum lower threshold of 510
bits (4n&gt;2512, n&gt;2510) [1] security requirements.
Secondly, the prime numbers in the 5th and 6th
hundred (L5 and L6) can be removed, since
bits),
which
= 533.855 = 534 bits = 533.855 = 534
bits, which satisfies the requirement n &gt; 2510 with
a margin of 24 bits. Ignoring the last 2 columns of
product n of all   of the optimal set Lopt is
estimated to be a binary number of length 528 bits.
By adding 2 bits, we get the estimated log p = 530
bits. For the Lopt distribution, Table 1 can be
corrected: in column h = 1 of the table, the values
 1 = 21,  1 = 113.081 should be put, and the
last 2 columns of the table should be deleted. Then
4 4
∑ℎ=1  ℎ = 74, ∑ℎ=1  ℎ
= 527.141 = 528 bits,
= 530бит. Such an optimal distribution of
the isogenies</p>
      <p>degrees {  } ensures that the
minimal threshold log
removing the 2 maximum isogeny degrees 397
and 389 for a total cost of 18 bits and taking
= 383. However, this requires reducing the
length K </p>
      <p>− 2 of the secret key by 2.</p>
      <p>The main advantage of the set of isogeny
degrees Lopt proposed here over that used in [1]
is
a</p>
      <p>significant
= 587 to 
(1.5
times)
reduction</p>
      <p>of
with such a radical decrease in the value of  
this only increases the security level of the
algorithm and the value of  
. For example,
let’s take</p>
      <p>= 101, then the 24 degrees of the
first hundred numbers must be replaced by 17
primes of the 5th hundred and the minimum 7
degrees of the 6th hundred (
the optimal set {  }74 = {101, 107, . . , 557}.. The
total sum log(</p>
      <p>) of this set is 627.161, which,
with 2 bits added, gives the estimated log
p = 630 bits. Compared to the first distribution
discussed above, the length log p of the key has
increased by 100 bits. Here you can also exchange
these 100 bits for a decrease in  
significantly reduce the value of K (by an estimate
, but this will
= 557). We get
of 11).</p>
      <p>Let’s move on to estimating the probability of
a successful choice of a random point P at the start
of each step of calculating the isogenic curve. In
step
  → 
7
=
of</p>
      <p>Algorithm
1,
we
replace

∏ =1   , then multiplication by 4 of a
random point P gives a point R of maximum odd
order ord(R) = n with probability
 =1</p>
      <p>Pr(R) =
 ( )</p>
      <p>=
 =1
(
 − 1)/  =
∏(1 −  −1) .</p>
      <p>(7)
set {  }
obvious that the smallest values of   , the decrease
in probability (7) is more significant than for large
ones. Already from this, we can conclude that to
increase the probability (7) it is advisable to avoid
very small values of   .</p>
      <p>For a comparative estimate of probabilities (7),
we consider two extreme options: 1. Filling in the
 of size K from below; 2. Filling the set
Option 1 is hypothetical since it immediately
violates the
given
constraints. In the</p>
      <p>Lopt
distribution, he requires replacing the removal of
3 lower degrees with the removal of higher ones:</p>
      <p>= {3, 5, 7, … , 379}. However, these 3 high
numbers add up to about 26 bits, which exceeds
the maximum reserve of 24 bits concerning the
minimum
lower threshold
the overall probability estimate (7) for the optimal
set {3, 5, 7, … , 379}74 equal to Pr(R) = 0.194.
Only for 24 degrees of isogenies of the first
hundred numbers, this probability is equal 0.241.
The greatest contribution to the reduction of this
probability is made by the smallest degrees of 3
. The probability estimate of
and 5: 2</p>
      <p>∙ 4 = 8
3
5</p>
      <p>15
satisfactory.
0.194</p>
      <p>for option 1 cannot be considered
Option 2 corresponds to the Lopt distribution
proposed above exactly 74 primes lie densely in
the
set {11, 13, … , 397}74. The
probability
estimate (7) for this set {  }
the number n is missing in the order of a random
point R is equal to  −1. Hence it follows that the
most probable failures are in the search for
subgroups of the curve of very small orders. For
example, for the second optimal distribution
{101, 103, 107, … , 557}74 considered above, the
probability of an unsuccessful selection of a
random point with an order that does not contain
the factor   does not exceed 1%. Here one can
expect with great confidence a smooth process of
calculating isogenic curves.</p>
      <p>We do not know the elements of the set {  }
in the
model from
[1]. Random
selection is
difficult to justify. It is only known that the set of
these degrees is determined by the security level
and
the
fulfillment
of
the
=  + 1 ≅ 2512. Although the first
distribution of Lopt degrees is much better than
[1],
its
further improvement
may
involve
resources that have not yet been used in the size K
of the set and the values of the exponents 
isogenies. Any algorithm has rich resources for

modification.</p>
      <p>An important conclusion of the probabilistic
analysis of a successful choice of a random point
is the recommendation to avoid using the lowest
degrees of isogenies. They contribute the least to
the security of the algorithm and the most to the
problem of finding isogeny kernels.</p>
    </sec>
    <sec id="sec-6">
      <title>5. Combined</title>
    </sec>
    <sec id="sec-7">
      <title>Encryption based on</title>
    </sec>
    <sec id="sec-8">
      <title>CSIKE-ENC Scheme</title>
      <p>The disadvantage of the CSIKE algorithm
proposed
in
[2]
is
the
lack
of
sender
authentication. At the same time, the information
available to Bob—Alice’s public key  А—can be
used by him to solve this problem using CSIDH.
In addition, the extension and modification of the
algorithm make it possible to perform the target
function in one package—symmetric encryption
of the message M of the sender. Such an extended
algorithm
can be called</p>
      <sec id="sec-8-1">
        <title>CSIKE-ENC (ENC</title>
      </sec>
      <sec id="sec-8-2">
        <title>Encryption). It is a</title>
        <p>combined
asymmetricsymmetric algorithm. Classical ECC protocols, it
is similar to ECIES (one of the standards is
ISO/IEC 1803-2-2009).</p>
        <p>Let us introduce the notation:</p>
        <p>Со is the result of encrypting the secret
key κ with Bob’s public key (Со &lt; p);</p>
        <p>M—message.
  =</p>
        <p>symmetric encryption key κ.
message M with the key κ.</p>
        <p>(  ) is the result of decrypting the</p>
        <p>(М)—message M cipher with
 , —imitation inserts of Alice and</p>
      </sec>
      <sec id="sec-8-3">
        <title>Bob authentication. H(M)—hash code of message M. In this paper, we propose the following message transfer protocol M.</title>
        <sec id="sec-8-3-1">
          <title>Pre Calculations</title>
          <p>Alice and Bob, based on their public keys
  ,   and the non-interactive CSIDH algorithm,
compute
shared
secrets</p>
          <p>, intended as imitation insets for</p>
        </sec>
        <sec id="sec-8-3-2">
          <title>1. Encryption</title>
          <p>Alice:
(11)</p>
          <p>(7)
(5)
2. During encapsulation, encrypts the key κ
with Bob’s public key and calculates the
encrypted key    = С
о &lt;  .
3. Expands the</p>
          <p>message M in the form
 ̃ = (</p>
          <p>,  ).
4. Using the standard known to the parties
encrypts the message  ̃ with the key κ of the
symmetric cryptosystem:  
= 
 ( ̃).
5. Sends to Bob a packet with two ciphers</p>
          <p>DP = (Со,   ).</p>
        </sec>
        <sec id="sec-8-3-3">
          <title>2. Decryption</title>
          <p>Bob:
1. Using its additive inverse key (−  )
decrypts the first cipher С
о (Со &lt;  ) and
calculates the key κ (key decapsulation).
2. Decrypts the second cipher with the key  :
 ̃ =</p>
          <p>(  ) = (
3. Checks for equality 
 ,  ).
without a digital signature performs two of its
functions—authentication and message integrity
check (including transmission errors).</p>
          <p>In the previous work [2], 2 examples of the
implementation of the CSIKE model with input
parameters</p>
          <p>p = 9239,</p>
          <p>= (4, −3, −3,2),   = (3, −2,2, −3), using
2 secret keys   ,   , without Alice’s key   . To
authenticate</p>
        </sec>
      </sec>
      <sec id="sec-8-4">
        <title>Alice</title>
        <p>in
the
above-combined
encryption protocol, it is proposed to use this 3rd
key to calculate the tags of Alice and
Bob
according to the CSIDH secret-sharing algorithm.
They serve as an imitation insert that Bob checks
for validity. In continuation of example 2 [2],
below</p>
        <p>we illustrate an example of calculating
randomized isogenic chains to determine the
computes her public key   =   ∗  0 with one
of 220 possible isogeny chains of length 10 [2]:</p>
        <p>It is clear that, due to the commutativity of
CSIDH, 
 =  
= 2384 = 
 .</p>
      </sec>
      <sec id="sec-8-5">
        <title>These</title>
        <p>results are obtained by Alice and Bob at the
precomputation stage of the CSIKE-ENC scheme.
Essentially, this step means inserting the CSIDH
into the CSIKE-ENC.</p>
        <p>The question may arise: if with the help of
CSIDH the task of secrets sharing is solved easier
4900 −1 3466 1 7327 −1
(11)</p>
        <p>(7)
→
undoubted advantage of the latter is the increase
in security. CSIDH includes 3 secret keys  А,
while CSIKE-ENC includes 5 secret keys
,   ,  . The main argument of our
assertion is that the attack on  
on the known public keys  
in CSIDH relies
and   of Alice and
Bob,
while in</p>
        <p>CSIKE-ENC the analyst for
attacking the key κ has no information at all. Only
Alice has the key   generating κ. The above
arguments complicate the task of cracking the
key κ. Different versions of the replacement
κ←H(κ) proposed above to increase the entropy
of the key and the security level. The question
raised
requires
detailed
analysis
and
quantitative assessments.
be received.</p>
        <p>A good modification of CSIDH and
CSIKEENC is to make the parameter  0 secret of the
original Е0 .This requires swapping Alice’s and
Bob’s public keys but adds another private key
and makes the analyst’s task almost hopeless.
When retransmitting
an
encrypted
message
based on CSIKE-ENC, for example,  0 ←  can
  
security.</p>
        <p>It should be noted that the security level of
СSIDH is estimated by the size of the set of all
SECs close to √ [1]. Then for a module p with
a length of 512 bits, as in [1], it is equal to 256
bits for a classical computer and 128 bits for a
quantum one. We believe that hashing the key
will achieve the
maximum level of</p>
      </sec>
    </sec>
    <sec id="sec-9">
      <title>6. Conclusion</title>
      <p>The paper presents an original CSIKE-ENC
scheme for combined encryption of key κ and
message  ̃</p>
      <p>with sender authentication. The
asymmetric algorithms CSIKE and CSIDH solve
the problems of key encapsulation κ and Alice’s
authentication using imitation inserts, while the
symmetric algorithm 
encrypts the
message along
with the secret
imitation insert. The proposed scheme differs
from the known KEM schemes in simplicity and
efficiency. The security level in relation to the
quantum computer of this scheme is estimated
as (log p)/4. The increase in security in the key
κ encapsulation scheme in comparison
with
Diffie–Hellman secret sharing is substantiated.
A further increase in circuit security can be
( ̃)

with the key κ
achieved by:</p>
      <p>Classification of the starting curve  0.</p>
      <sec id="sec-9-1">
        <title>Hashing the key κ.</title>
        <p>the scheme is achieved:
and (W: Z) coordinates.</p>
        <p>Increased efficiency of the implementation of
Using fast quadratic and twisted SEСs
Rejection of redundant calculations of
isogenic functions φ(R) of the point R.</p>
        <p>Randomization of CSIKE and CSIDH</p>
        <p>Optimization of scalar multiplication of
point R in (W: Z) coordinates.</p>
      </sec>
      <sec id="sec-9-2">
        <title>Optimization of the</title>
        <p>distribution Lopt
isogeny degrees and a significant (1.5 times)
decrease in the maximum degree to  
=397.</p>
        <p>By avoiding small values of degrees in the
set {  } .
the</p>
        <p>model
standardization.</p>
        <p>and</p>
      </sec>
    </sec>
    <sec id="sec-10">
      <title>7. References</title>
      <p>In future work, we plan to continue the analysis
of CSIKE modifications with the improvement of
the
prospect
of
further
[1]</p>
      <p>W. Castryck, et al., CSIDH: An Efficient</p>
      <sec id="sec-10-1">
        <title>Cryptology 395–427.</title>
      </sec>
      <sec id="sec-10-2">
        <title>Post-Quantum</title>
      </sec>
      <sec id="sec-10-3">
        <title>Action,</title>
      </sec>
      <sec id="sec-10-4">
        <title>Advances in</title>
      </sec>
      <sec id="sec-10-5">
        <title>Commutative</title>
      </sec>
      <sec id="sec-10-6">
        <title>Group</title>
      </sec>
      <sec id="sec-10-7">
        <title>ASIACRYPT 2018, (2018) doi:10.1007/978-3-030-03332-3_15</title>
      </sec>
      <sec id="sec-10-8">
        <title>A. Bessalov, et al.,</title>
      </sec>
      <sec id="sec-10-9">
        <title>Modeling</title>
      </sec>
      <sec id="sec-10-10">
        <title>CSIKE Algorithm on Non-Cyclic Edwards Curves, in: Workshop on Cybersecurity Providing in</title>
      </sec>
      <sec id="sec-10-11">
        <title>Information and</title>
      </sec>
      <sec id="sec-10-12">
        <title>Telecommunication</title>
        <p>Systems, vol. 3288 (2022) 1–10.
S. Kim, et al.,</p>
      </sec>
      <sec id="sec-10-13">
        <title>Optimized</title>
      </sec>
      <sec id="sec-10-14">
        <title>Method for</title>
      </sec>
      <sec id="sec-10-15">
        <title>Computing</title>
      </sec>
      <sec id="sec-10-16">
        <title>Odd-Degree</title>
      </sec>
      <sec id="sec-10-17">
        <title>Isogenies on Edwards Curves, Advances in Cryptology –</title>
      </sec>
      <sec id="sec-10-18">
        <title>ASIACRYPT 2019, (2019) 273–292.</title>
        <p>R. R. Farashahi, S.G. Hosseini, Differential
Addition on Twisted Edwards Curves, Inf.</p>
      </sec>
      <sec id="sec-10-19">
        <title>Secur.</title>
      </sec>
      <sec id="sec-10-20">
        <title>Privacy (2017) 366–378. doi:10.1007/978-3-319-59870-3_21</title>
        <p>Computations on Twisted Edwards Curves,</p>
      </sec>
      <sec id="sec-10-21">
        <title>Secur.</title>
      </sec>
      <sec id="sec-10-22">
        <title>Commun.</title>
      </sec>
      <sec id="sec-10-23">
        <title>Networks, (2018). doi:10.1155/2018/5747642</title>
      </sec>
      <sec id="sec-10-24">
        <title>D. Moody,</title>
      </sec>
      <sec id="sec-10-25">
        <title>D. Shumow,</title>
      </sec>
      <sec id="sec-10-26">
        <title>Analogues of</title>
        <p>Velus Formulas for Isogenies on Alternate
Models of Elliptic Curves, Mathematics of
Computation, 85(300) (2016) 1929–1951.
doi:10.1090/mcom/3036
A. Bessalov, et al., Computing of Odd
Degree Isogenies on Supersingular Twisted</p>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          6.
          <source>Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2923</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>11</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>T.</given-names>
            <surname>Moriya</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Onuki</surname>
          </string-name>
          , T. Takagi,
          <article-title>How to construct CSIDH on Edwards curves</article-title>
          ,
          <source>Cryptographers' Track at the RSA Conference, CT-RSA</source>
          <year>2020</year>
          , (
          <year>2020</year>
          )
          <fpage>512</fpage>
          -
          <lpage>537</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>030</fpage>
          -40186-3_
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <article-title>How to Construct CSIDH on Quadratic and Twisted Edwards Curves</article-title>
          , Cybersecurity: Education, Science, Technique,
          <volume>3</volume>
          (
          <issue>15</issue>
          ) (
          <year>2022</year>
          )
          <fpage>148</fpage>
          -
          <lpage>163</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>15</volume>
          .148163
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Kovalchuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Abramov</surname>
          </string-name>
          ,
          <article-title>Randomization of CSIDH Algorithm on Quadratic and Twisted Edwards Curves</article-title>
          ,
          <source>Cybersecurity: Education, Science, Technique</source>
          <volume>1</volume>
          (
          <issue>17</issue>
          ) (
          <year>2022</year>
          )
          <fpage>128</fpage>
          -
          <lpage>144</lpage>
          . doi:
          <volume>10</volume>
          .28925/
          <fpage>2663</fpage>
          -
          <lpage>4023</lpage>
          .
          <year>2022</year>
          .
          <volume>17</volume>
          .128144
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>D. J.</given-names>
            <surname>Bernstein</surname>
          </string-name>
          , et al.,
          <source>Twisted Edwards Curves, AFRICACRYPT</source>
          <year>2008</year>
          , (
          <year>2008</year>
          )
          <fpage>389</fpage>
          -
          <lpage>405</lpage>
          . doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>540</fpage>
          -68164- 9_
          <fpage>26</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <article-title>Elliptic Curves in the Edwards Form</article-title>
          and Cryptography, Monograph,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Tsygankova</surname>
          </string-name>
          ,
          <article-title>Number of Curves in the Generalized Ed-Wards Form with Minimal Even Cofactor of the Curve Order</article-title>
          , Problems of Information Transmission,
          <volume>53</volume>
          (
          <issue>1</issue>
          ) (
          <year>2017</year>
          )
          <fpage>92</fpage>
          -
          <lpage>101</lpage>
          . doi:
          <volume>10</volume>
          .1134/S0032946017010082
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , L. Kovalchuk,
          <article-title>Supersingular Twisted Edwards Curves Over Prime Fields. I. Supersingular Twisted Ed-wards Curves with j-Invariants Equal to Zero and 123, Cybernetics</article-title>
          and Systems Analysist,
          <volume>55</volume>
          (
          <issue>3</issue>
          ) (
          <year>2019</year>
          )
          <fpage>347</fpage>
          -
          <lpage>353</lpage>
          . doi:
          <volume>10</volume>
          .1007/S10559-019-00140-9
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , L. Kovalchuk,
          <article-title>Supersingular Twisted Edwards Curves over Prime Fields.* II. Supersingular Twisted Edwards Curves with the j-Invariant Equal to 663, Cybernetics</article-title>
          and Systems Analysist,
          <volume>55</volume>
          (
          <issue>5</issue>
          ) (
          <year>2019</year>
          )
          <fpage>731</fpage>
          -
          <lpage>741</lpage>
          . doi:
          <volume>10</volume>
          .1007/s10559-019- 00183-y
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <article-title>Implementation of the CSIDH Algorithm Model on Supersingular Twisted and Quadratic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3187</volume>
          , no.
          <issue>1</issue>
          (
          <year>2022</year>
          )
          <fpage>302</fpage>
          -
          <lpage>309</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <source>Analysis of 2-Isogeny Properties of Generalized Form Edwards Curves, in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>2746</volume>
          (
          <year>2020</year>
          )
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <article-title>Modeling of 3- and 5-Isogenies of Supersingular Edwards Curves</article-title>
          ,
          <source>in: 2nd International Workshop on Modern Machine Learning Technologies and Data Science, no. I</source>
          , vol.
          <volume>2631</volume>
          (
          <year>2020</year>
          )
          <fpage>30</fpage>
          -
          <lpage>39</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>H.</given-names>
            <surname>Onuki</surname>
          </string-name>
          , et al.,
          <article-title>A Faster Constant-time Algorithm of CSIDH keeping Two Points</article-title>
          . ASI-ACRYPT, (
          <year>2020</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Jalali</surname>
          </string-name>
          , et al.,
          <source>Towards Optimized and Constant-Time CSIDH on Embedded Devices. IACR Cryptology ePrint Archive</source>
          , (
          <year>2019</year>
          )
          <fpage>297</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>R.</given-names>
            <surname>Azarderakhsh</surname>
          </string-name>
          , et al.,
          <article-title>Supersingular Isogeny Key Encapsu-lation-Submission to the NIST's Post-Quantum Cryptography Standardization Process, (</article-title>
          <year>2016</year>
          ).
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>Mingping</given-names>
            <surname>Qi</surname>
          </string-name>
          .
          <article-title>An efficient Post-Quantum KEM from CSIDH</article-title>
          , J. Math. Cryptology,
          <volume>16</volume>
          (
          <year>2022</year>
          )
          <fpage>103</fpage>
          -
          <lpage>113</lpage>
          . doi:
          <volume>10</volume>
          .1515/jmc-2022- 0007.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [23]
          <string-name>
            <given-names>K.</given-names>
            <surname>Yoneyama</surname>
          </string-name>
          ,
          <article-title>Post-Quantum Variants of ISO/IEC Standards: Compact Chosen CiPher Text Secure Key Encapsulation Mechanism from Isogeny</article-title>
          ,
          <source>Proceedings of the 5th ACM Workshop on Security Standardization Research Workshop</source>
          , (
          <year>2019</year>
          )
          <fpage>13</fpage>
          -
          <lpage>21</lpage>
          . doi:
          <volume>10</volume>
          .1145/3338500.3360336
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>L.</given-names>
            <surname>Washington</surname>
          </string-name>
          , Elliptic Curves:
          <source>Number Theory and Cryptography</source>
          , Second Edition, CRC Press, (
          <year>2008</year>
          ).
          <source>doi: 10.1201/9781420071474</source>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>