Expand description
Quantum‐Resistant Cryptography via Lemniscate Lattices and AGM Transformations
References:
- Castryck, W., Decru, T. (2023). An efficient key recovery attack on SIDH. IACR Cryptol. ePrint Arch.
- Jao, D., De Feo, L. (2011). Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. PQCrypto.
- Mestre, J. F. (2000). Lettre à Gaudry et Harley sur l’utilisation de l’AGM. Preprint.
§Enhanced Features
- Comprehensive error diagnostics with solution hints
- Detailed transformation tracing
- Built-in runtime performance analysis
- Custom graphing module for cryptographic metrics
- Prime validation and parameter verification
- Complete operational history tracking
Structs§
- Crypto
Graph - Graphing module for cryptographic visualization
- LaiCrypto
Engine - LAI cryptographic engine with enhanced capabilities
- Perf
Metrics - Performance metrics for operations
- Trace
Step - Detailed transformation step recording
Enums§
- Graph
Style - LaiCrypto
Error - Comprehensive error types with solution guidance