De Feo, LucaFouotsa, Tako BorisPanny, Lorenz2024-06-272024-06-272024-06-27202410.1007/978-3-031-58754-2_7https://infoscience.epfl.ch/handle/20.500.14299/208879Given two elliptic curves and the degree of an isogeny between them, finding the isogeny is believed to be a difficult problem—upon which rests the security of nearly any isogeny-based scheme. If, however, to the data above we add information about the behavior of the isogeny on a large enough subgroup, the problem can become easy, as recent cryptanalyses on SIDH have shown. Between the restriction of the isogeny to a full N-torsion subgroup and no “torsion information” at all lies a spectrum of interesting intermediate problems, raising the question of how easy or hard each of them is. Here we explore modular isogeny problems where the torsion information is masked by the action of a group of 2x2 matrices. We give reductions between these problems, classify them by their difficulty, and link them to security assumptions found in the literature.isogeniesPost-quantumSecurity reductionsIsogeny Problems with Level Structuretext::conference output::conference proceedings::conference paper