Dustin Moody

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Post-Quantum Cryptography
2022-10-13Paper
On ranks of quadratic twists of a Mordell curve
The Ramanujan Journal
2022-08-26Paper
Pairs of Heron and right triangles with a common area and a common perimeter
Publicationes Mathematicae Debrecen
2022-05-09Paper
Isogenies on twisted Hessian curves
Journal of Mathematical Cryptology
2021-07-14Paper
On the family of elliptic curves \(X + 1/X + Y + 1/Y + t = 0\)2021-05-03Paper
On the rank of elliptic curves arising from Pythagorean quadruplets, II
Colloquium Mathematicum
2021-01-25Paper
Families of elliptic curves of rank \(\geq 5\) over \(\mathbb Q(t)\)
Rocky Mountain Journal of Mathematics
2020-01-17Paper
New mission and opportunity for mathematics researchers: cryptography in the quantum era
Advances in Mathematics of Communications
2019-11-26Paper
Elliptic curves arising from the triangular numbers2019-06-21Paper
Improved attacks for characteristic-2 parameters of the cubic ABC Simple Matrix Encryption scheme2018-09-12Paper
Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme2018-02-16Paper
Geometric progressions on elliptic curves
Glasnik Matematicki
2018-01-12Paper
Heron quadrilaterals via elliptic curves
Rocky Mountain Journal of Mathematics
2017-10-12Paper
Integral isosceles triangle-parallelogram and Heron triangle-rhombus pairs with a common area and common perimeter
Journal of Number Theory
2017-08-31Paper
On the rank of elliptic curves with long arithmetic progressions
Colloquium Mathematicum
2017-05-10Paper
Arithmetic progressions on conics2017-01-03Paper
High rank elliptic curves with torsion \(\mathbb Z/4 \mathbb Z\) induced by Kihara's elliptic curves
Integers
2016-10-28Paper
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
Journal of Mathematical Cryptology
2016-06-09Paper
Improved indifferentiability security bound for the JH mode
Designs, Codes and Cryptography
2016-05-19Paper
Vulnerabilities of ``McEliece in the world of Escher
Post-Quantum Cryptography
2016-04-26Paper
Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves
Mathematics of Computation
2016-03-23Paper
Character sums determined by low degree isogenies of elliptic curves
Rocky Mountain Journal of Mathematics
2015-08-25Paper
Character sums determined by low degree isogenies of elliptic curves
Rocky Mountain Journal of Mathematics
2015-08-25Paper
Division polynomials for Jacobi quartic curves
Proceedings of the 36th international symposium on Symbolic and algebraic computation
2015-06-09Paper
On integer solutions of \(x^4+y^4-2z^4-2w^4=0\)2015-03-05Paper
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Post-Quantum Cryptography
2015-01-14Paper
Elliptic curves arising from Brahmagupta quadrilaterals
Bulletin of the Australian Mathematical Society
2014-08-04Paper
Using \(5\)-isogenies to quintuple points on elliptic curves
Information Processing Letters
2013-03-28Paper
Class numbers via 3-isogenies and elliptic surfaces
International Journal of Number Theory
2013-01-29Paper
Mean value formulas for twisted Edwards curves2012-12-30Paper
Arithmetic progressions on Huff curves
Annales Mathematicae et Informaticae
2012-09-18Paper
Computing isogeny volcanoes of composite degree
Applied Mathematics and Computation
2012-06-11Paper
Isomorphism classes of Edwards curves over finite fields
Finite Fields and their Applications
2012-05-07Paper
Families of elliptic curves with rational 3-torsion
Journal of Mathematical Cryptology
2012-03-22Paper
Arithmetic progressions on Edwards curves2011-02-17Paper
The Diffie-Hellman problem and generalization of Verheul's theorem
Designs, Codes and Cryptography
2009-10-14Paper


Research outcomes over time


This page was built for person: Dustin Moody