Geometry Seminar
University of Tor Vergata, Department of Mathematics
13th of May 2025, 14:30-16:00,room D’Antoni
Algebraic pathfinding between superspecial principally polarized abelian surfaces
Wouter Castryck
KU Leuven
Charles, Goren and Lauter in 2006 proposed a cryptographic hash function based on walks in the ℓ-isogeny graph of supersingular elliptic curves in large characteristic p. In 2020 Eisenträger et al. showed that such hash functions allow for an efficient computation of second pre-images (and hence are dramatically broken) as soon as the endomorphism ring of the starting vertex is known. In this attack, the main auxiliary tool is the so-called "KLPT algorithm" for finding a connecting ideal between two maximal orders in a positive definite quaternion algebra. Since all known methods for constructing supersingular elliptic curves implicitly leak the endomorphism ring, secure instantiations of the CGL hash function should be set up by a trusted party, or through multi-party computation. In this talk I will present a similar result for hash functions from |