<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web02.fireside.fm</fireside:hostname>
    <fireside:genDate>Sat, 25 Apr 2026 13:57:26 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>Cryptography FM - Episodes Tagged with “Isogenies”</title>
    <link>https://cryptography.fireside.fm/tags/isogenies</link>
    <pubDate>Tue, 24 Aug 2021 14:15:00 +0200</pubDate>
    <description>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>In-depth, substantive discussions on the latest news and research in applied cryptography.</itunes:subtitle>
    <itunes:author>Symbolic Software</itunes:author>
    <itunes:summary>Cryptography FM is a regular podcast with news and a featured interview covering the latest developments in theoretical and applied cryptography. Whether it's a new innovative paper on lattice-based cryptography or a novel attack on a secure messaging protocol, we'll get the people behind it on Cryptography FM.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:keywords>cryptography</itunes:keywords>
    <itunes:owner>
      <itunes:name>Symbolic Software</itunes:name>
      <itunes:email>nadim@symbolic.software</itunes:email>
    </itunes:owner>
<itunes:category text="Science">
  <itunes:category text="Mathematics"/>
</itunes:category>
<itunes:category text="Technology"/>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!</title>
  <link>https://cryptography.fireside.fm/21</link>
  <guid isPermaLink="false">47d6b3f7-bea5-4449-80d6-72321405466e</guid>
  <pubDate>Tue, 24 Aug 2021 14:15:00 +0200</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/47d6b3f7-bea5-4449-80d6-72321405466e.mp3" length="67493429" type="audio/mpeg"/>
  <itunes:episode>21</itunes:episode>
  <itunes:title>Episode 21: Proving Fundamental Equivalencies in Isogeny Mathematics!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.</itunes:subtitle>
  <itunes:duration>46:52</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.
Links and papers discussed in the show:
* The supersingular isogeny path and endomorphism ring problems are equivalent (https://eprint.iacr.org/2021/919)
* Episode 5: Isogeny-based Cryptography for Dummies! (https://www.cryptography.fm/5)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guest: Benjamin Wesolowski.
</description>
  <itunes:keywords>isogeny-based cryptography</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2021/919" rel="nofollow">The supersingular isogeny path and endomorphism ring problems are equivalent</a></li>
<li><a href="https://www.cryptography.fm/5" rel="nofollow">Episode 5: Isogeny-based Cryptography for Dummies!</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Benjamin Wesolowski.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">Capsule Social</a>: <a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.</a></li></ul><p>Links:</p><ul><li><a title="The supersingular isogeny path and endomorphism ring problems are equivalent" rel="nofollow" href="https://eprint.iacr.org/2021/919">The supersingular isogeny path and endomorphism ring problems are equivalent</a></li><li><a title="Episode 5: Isogeny-based Cryptography for Dummies!" rel="nofollow" href="https://www.cryptography.fm/5">Episode 5: Isogeny-based Cryptography for Dummies!</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Benjamin Wesolowski talks about his latest paper in which he mathematically proved that the two fundamental problems underlying isogeny-based cryptography are equivalent.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2021/919" rel="nofollow">The supersingular isogeny path and endomorphism ring problems are equivalent</a></li>
<li><a href="https://www.cryptography.fm/5" rel="nofollow">Episode 5: Isogeny-based Cryptography for Dummies!</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guest: Benjamin Wesolowski.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">Capsule Social</a>: <a rel="nofollow" href="https://capsule.join.com/jobs/2329486-backend-engineer-with-cryptography-and-decentralized-tech-experience">At Capsule Social, Inc. we are building a platform for decentralized discourse. A place where content creators, writers, and thinkers have full ownership and control over their speech, and enjoy resilience from censorship and takedowns.

Capsule Social is hiring decentralized technology engineers, and we'd be thrilled for you to apply.</a></li></ul><p>Links:</p><ul><li><a title="The supersingular isogeny path and endomorphism ring problems are equivalent" rel="nofollow" href="https://eprint.iacr.org/2021/919">The supersingular isogeny path and endomorphism ring problems are equivalent</a></li><li><a title="Episode 5: Isogeny-based Cryptography for Dummies!" rel="nofollow" href="https://www.cryptography.fm/5">Episode 5: Isogeny-based Cryptography for Dummies!</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 5: Isogeny-based Cryptography for Dummies!</title>
  <link>https://cryptography.fireside.fm/5</link>
  <guid isPermaLink="false">17a4b729-0fc3-4eb0-9b32-5f35683bd4c0</guid>
  <pubDate>Tue, 27 Oct 2020 16:00:00 +0100</pubDate>
  <author>Symbolic Software</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/ab43586a-0143-48c8-af78-ac9dc4316514/17a4b729-0fc3-4eb0-9b32-5f35683bd4c0.mp3" length="69957033" type="audio/mpeg"/>
  <itunes:episode>5</itunes:episode>
  <itunes:title>Episode 5: Isogeny-based Cryptography for Dummies!</itunes:title>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Symbolic Software</itunes:author>
  <itunes:subtitle>Luca Deo Feo and Hart Montgomery try to explain isogeny-based cryptography to Nadim.</itunes:subtitle>
  <itunes:duration>48:34</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/a/ab43586a-0143-48c8-af78-ac9dc4316514/cover.jpg?v=2"/>
  <description>The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have all received enormous renewed interest as a result.
While the NIST post-quantum competition recently announced that it’s favoring candidates founded on lattice-based cryptography, it also encouraged further research into isogeny-based cryptography. But what even is isogeny-based cryptography? Is it as intimidating as it sounds? And what’s keeping it behind on NIST’s list of post-quantum primitives?
Today, it’s my pleasure to be joined by isogeny-based cryptography researchers Luca de Feo and Hart Montgomery, co-authors of a recent publication titled “Cryptographic Group Actions and Applications”, which Luca affectionately described as a “isogeny-based cryptography for dummies” paper. We’ll be discussing isogeny-based cryptography and more.
Links and papers discussed in the show:
* Cryptographic Group Actions and Applications (https://eprint.iacr.org/2020/1188)
* CSIDH Intro (https://csidh.isogeny.org/)
Music composed by Toby Fox and performed by Sean Schafianski (https://seanschafianski.bandcamp.com/). Special Guests: Hart Montgomery and Luca De Feo.
</description>
  <itunes:keywords>isogeny-based cryptography</itunes:keywords>
  <content:encoded>
    <![CDATA[<p>The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have all received enormous renewed interest as a result.</p>

<p>While the NIST post-quantum competition recently announced that it’s favoring candidates founded on lattice-based cryptography, it also encouraged further research into isogeny-based cryptography. But what even is isogeny-based cryptography? Is it as intimidating as it sounds? And what’s keeping it behind on NIST’s list of post-quantum primitives?</p>

<p>Today, it’s my pleasure to be joined by isogeny-based cryptography researchers Luca de Feo and Hart Montgomery, co-authors of a recent publication titled “Cryptographic Group Actions and Applications”, which Luca affectionately described as a “isogeny-based cryptography for dummies” paper. We’ll be discussing isogeny-based cryptography and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2020/1188" rel="nofollow">Cryptographic Group Actions and Applications</a></li>
<li><a href="https://csidh.isogeny.org/" rel="nofollow">CSIDH Intro</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Hart Montgomery and Luca De Feo.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>The NIST post-quantum competition has started a race for post-quantum cryptography. As a result, we’ve seen a great deal of research into alternative hard mathematical problems to use as a basis for public-key cryptography schemes. Lattice-based cryptography! Error-correcting code based cryptography! And of course, isogeny-based cryptography, have all received enormous renewed interest as a result.</p>

<p>While the NIST post-quantum competition recently announced that it’s favoring candidates founded on lattice-based cryptography, it also encouraged further research into isogeny-based cryptography. But what even is isogeny-based cryptography? Is it as intimidating as it sounds? And what’s keeping it behind on NIST’s list of post-quantum primitives?</p>

<p>Today, it’s my pleasure to be joined by isogeny-based cryptography researchers Luca de Feo and Hart Montgomery, co-authors of a recent publication titled “Cryptographic Group Actions and Applications”, which Luca affectionately described as a “isogeny-based cryptography for dummies” paper. We’ll be discussing isogeny-based cryptography and more.</p>

<p>Links and papers discussed in the show:</p>

<ul>
<li><a href="https://eprint.iacr.org/2020/1188" rel="nofollow">Cryptographic Group Actions and Applications</a></li>
<li><a href="https://csidh.isogeny.org/" rel="nofollow">CSIDH Intro</a></li>
</ul>

<p>Music composed by Toby Fox and performed by <a href="https://seanschafianski.bandcamp.com/" rel="nofollow">Sean Schafianski</a>.</p><p>Special Guests: Hart Montgomery and Luca De Feo.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://symbolic.software">Symbolic Software</a>: <a rel="nofollow" href="https://symbolic.software">This episode is sponsored by Symbolic Software. Symbolic Software helps you bring in the experience and knowledge necessary to design, or prove secure, state-of-the-art cryptographic systems for new solutions. We've helped design and formally verify some of the world's most widely used cryptographic protocols.</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
