J. Biasse, C. Fieker, and M. Jacobson, Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluation, LMS Journal of Computation and Mathematics, vol.19, pp.371-390, 2016.

J. Biasse, J. Michael, A. Jacobson, and . Iezzi, A note on the security of CSIDH

. Corr, , 2018.

X. Bonnetain and M. Naya-plasencia, Hidden shift quantum cryptanalysis and implications. Cryptology ePrint Archive, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01953914

A. M. Childs, D. Jao, and V. Soukharev, Constructing elliptic curve isogenies in quantum subexponential time, J. Mathematical Cryptology, vol.8, issue.1, pp.1-29, 2014.

W. Castryck, T. Lange, C. Martindale, L. Panny, and J. Renes, CSIDH: An efficient post-quantum commutative group action, Advances in Cryptology-ASIACRYPT 2018-24th Annual International Conference on the Theory and Application of Cryptology and Information Security, 2006.

J. Luca-de-feo, B. Kieffer, and . Smith, Towards practical key exchange from ordinary isogeny graphs. Cryptology ePrint Archive, 2018.

G. References and . Kuperberg,

, A Subexponential-Time Quantum Algorithm for the Dihedral Hidden Subgroup Problem

S. J. Comput, , vol.35, pp.170-188, 2005.

G. Kuperberg,

, Another Subexponential-time Quantum Algorithm for the Dihedral Hidden Subgroup Problem

, 8th Conference on the Theory of Quantum Computation, Communication and Cryptography, TQC 2013, pp.20-34, 2013.

, A Subexponential Time Algorithm for the Dihedral Hidden Subgroup Problem with Polynomial Space

. Corr, , 2004.