## Trusted Setup with Isogenies

Trusted parties are fundamental in setting up secure communication among parties. For instance, a trusted setup is needed when establishing a trusted relationship between users and certain public information in a public-key infrastructure (PKI) for public-key encryption and signature schemes. The risk with placing trust on a third party can be ...

## Isogenies for Cryptography

On July 22, 2020, the Round 3 finalists for the NIST Post-quantum Cryptography Standardization effort were announced. One of the alternate candidates for public-key encryption and key-establishement algorithms is SIKE, a key encapsulation mechanism (KEM) based on isogenies. A non-specialist wanting a basic understanding of the schemes may find t...