| Publication | Date of Publication | Type |
|---|
Critical perspectives on provable security: fifteen years of ``another look papers Advances in Mathematics of Communications | 2019-09-19 | Paper |
| On the cost of computing isogenies between supersingular elliptic curves | 2019-02-20 | Paper |
On the security of the WOTS-PRF signature scheme Advances in Mathematics of Communications | 2019-02-15 | Paper |
On isogeny graphs of supersingular elliptic curves over finite fields Finite Fields and their Applications | 2018-12-19 | Paper |
Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields Advances in Mathematics of Communications | 2018-11-15 | Paper |
| Another look at tightness. II: Practical issues in cryptography | 2017-10-23 | Paper |
On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One IEEE Transactions on Computers | 2017-09-08 | Paper |
Analyzing the Galbraith-Lin-Scott Point Multiplication Method for Elliptic Curves over Binary Fields IEEE Transactions on Computers | 2017-08-08 | Paper |
Fault Attacks on Pairing-Based Protocols: Revisited IEEE Transactions on Computers | 2017-05-16 | Paper |
Type 2 structure-preserving signature schemes revisited Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Cryptocash, cryptocurrencies, and cryptocontracts Designs, Codes and Cryptography | 2016-02-02 | Paper |
The random oracle model: a twenty-year retrospective Designs, Codes and Cryptography | 2015-10-26 | Paper |
Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma Arithmetic of Finite Fields | 2015-10-01 | Paper |
Another Look at Security Theorems for 1-Key Nested MACs Open Problems in Mathematics and Computational Science | 2015-06-22 | Paper |
Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography Finite Fields and their Applications | 2015-01-30 | Paper |
Another look at non-uniformity Groups - Complexity - Cryptology | 2014-05-02 | Paper |
Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography Pairing-Based Cryptography – Pairing 2013 | 2014-02-18 | Paper |
Another look at HMAC Journal of Mathematical Cryptology | 2013-11-12 | Paper |
Another look at security definitions Advances in Mathematics of Communications | 2013-05-06 | Paper |
Generalizations of Verheul's theorem to asymmetric pairings Advances in Mathematics of Communications | 2013-05-06 | Paper |
Implementing pairings at the 192-bit security level Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Another look at provable security. (Abstract) Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Another look at tightness Selected Areas in Cryptography | 2012-06-08 | Paper |
Discrete logarithms, Diffie-Hellman, and reductions Vietnam Journal of Mathematics | 2012-03-29 | Paper |
Parallelizing the Weil and Tate pairings Cryptography and Coding | 2011-12-16 | Paper |
On cryptographic protocols employing asymmetric pairings -- the role of \(\Psi \) revisited Discrete Applied Mathematics | 2011-08-10 | Paper |
A generic variant of NIST'S KAS2 key agreement protocol Information Security and Privacy | 2011-07-07 | Paper |
Elliptic curve cryptography: the serpentine course of a paradigm shift Journal of Number Theory | 2011-04-08 | Paper |
On reusing ephemeral keys in Diffie-Hellman key agreement protocols International Journal of Applied Cryptography | 2011-04-05 | Paper |
| Intractable problems in cryptography | 2011-01-03 | Paper |
Combined security analysis of the one- and three-pass unified model key agreement protocols Progress in Cryptology - INDOCRYPT 2010 | 2010-12-07 | Paper |
On the asymptotic effectiveness of Weil descent attacks Journal of Mathematical Cryptology | 2010-11-12 | Paper |
On the efficiency and security of pairing-based protocols in the type 1 and type 4 settings Arithmetic of Finite Fields | 2010-07-20 | Paper |
| The brave new world of bodacious assumptions in cryptography | 2010-05-25 | Paper |
Comparing two pairing-based aggregate signature schemes Designs, Codes and Cryptography | 2010-05-19 | Paper |
A new protocol for the nearby friend problem Cryptography and Coding | 2010-01-07 | Paper |
Reusing static keys in key agreement protocols Progress in Cryptology - INDOCRYPT 2009 | 2009-12-17 | Paper |
Comparing the pre- and post-specified peer models for key agreement International Journal of Applied Cryptography | 2009-05-12 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
| An introduction to pairing-based cryptography | 2009-03-16 | Paper |
Another look at non-standard discrete log and Diffie-Hellman problems Journal of Mathematical Cryptology | 2009-03-03 | Paper |
Comparing the Pre- and Post-specified Peer Models for Key Agreement Information Security and Privacy | 2008-07-08 | Paper |
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Another Look at “Provable Security”. II Progress in Cryptology - INDOCRYPT 2006 | 2008-04-11 | Paper |
Another look at HMQV Mathematical Cryptology | 2008-02-21 | Paper |
Supersingular Elliptic Curves in Cryptography Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Software Implementation of Arithmetic in Arithmetic of Finite Fields | 2007-11-15 | Paper |
Another look at ``provable security Journal of Cryptology | 2007-05-24 | Paper |
Another look at generic groups Advances in Mathematics of Communications | 2007-04-05 | Paper |
Formulas for cube roots in \(\mathbb F_{3^m}\) Discrete Applied Mathematics | 2007-03-02 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Cryptographic implications of Hess' generalized GHS attack Applicable Algebra in Engineering, Communication and Computing | 2006-09-12 | Paper |
On the number of trace-one elements in polynomial bases for \({\mathbb F}_{2^n}\) Designs, Codes and Cryptography | 2006-05-29 | Paper |
Algebraic curves and cryptography Finite Fields and their Applications | 2005-09-22 | Paper |
| scientific article; zbMATH DE number 2154287 (Why is no real title available?) | 2005-04-08 | Paper |
A Survey of Public-Key Cryptosystems SIAM Review | 2005-02-25 | Paper |
Security of signature schemes in a multi-user setting Designs, Codes and Cryptography | 2005-01-17 | Paper |
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree LMS Journal of Computation and Mathematics | 2004-11-18 | Paper |
| scientific article; zbMATH DE number 2114384 (Why is no real title available?) | 2004-11-10 | Paper |
Obstacles to the torsion-subgroup attack on the decision Diffie-Hellman Problem Mathematics of Computation | 2004-08-13 | Paper |
| scientific article; zbMATH DE number 1890835 (Why is no real title available?) | 2003-09-30 | Paper |
Validation of Elliptic Curve Public Keys Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
| scientific article; zbMATH DE number 1857527 (Why is no real title available?) | 2003-05-19 | Paper |
An efficient protocol for authenticated key agreement Designs, Codes and Cryptography | 2003-04-28 | Paper |
Solving elliptic curve discrete logarithm problems using Weil descent Journal of the Ramanujan Mathematical Society | 2003-02-25 | Paper |
The state of elliptic curve cryptography Designs, Codes and Cryptography | 2002-10-22 | Paper |
| scientific article; zbMATH DE number 1759279 (Why is no real title available?) | 2002-06-25 | Paper |
| scientific article; zbMATH DE number 1617935 (Why is no real title available?) | 2002-06-02 | Paper |
| scientific article; zbMATH DE number 1617931 (Why is no real title available?) | 2001-09-10 | Paper |
| scientific article; zbMATH DE number 1409225 (Why is no real title available?) | 2000-03-01 | Paper |
| scientific article; zbMATH DE number 1304129 (Why is no real title available?) | 2000-02-02 | Paper |
| scientific article; zbMATH DE number 1341873 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1149909 (Why is no real title available?) | 1998-11-17 | Paper |
| scientific article; zbMATH DE number 954401 (Why is no real title available?) | 1996-12-08 | Paper |
Reducing elliptic curve logarithms to logarithms in a finite field IEEE Transactions on Information Theory | 1994-10-03 | Paper |
Counting Points on Elliptic Curves Over F 2 m Mathematics of Computation | 1994-07-10 | Paper |
| scientific article; zbMATH DE number 503336 (Why is no real title available?) | 1994-05-24 | Paper |
Elliptic curve cryptosystems and their implementation Journal of Cryptology | 1994-01-19 | Paper |
| scientific article; zbMATH DE number 438988 (Why is no real title available?) | 1993-11-01 | Paper |
A note on cyclic groups, finite fields, and the discrete logarithm problem Applicable Algebra in Engineering, Communication and Computing | 1992-12-14 | Paper |
Subgroup Refinement Algorithms for Root Finding in $GF(q)$ SIAM Journal on Computing | 1992-06-28 | Paper |
On the Number of Self-Dual Bases of GF(q m ) Over GF(q) Proceedings of the American Mathematical Society | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4200379 (Why is no real title available?) | 1990-01-01 | Paper |
| scientific article; zbMATH DE number 4191556 (Why is no real title available?) | 1990-01-01 | Paper |