The applications of isogenies in Post Quantum Cryptography
After introducing the theory of elliptic curves and defining the necessary tools, we present some classical schemes in isogeny-based cryptography. As mentioned in the previous article, this part of Post...