| Publication | Date of Publication | Type |
|---|
Climbing and descending tall isogeny volcanos Research in Number Theory | 2024-12-16 | Paper |
A simpler and more efficient reduction of DLog to CDH for abelian group actions | 2024-11-12 | Paper |
Obfuscating evasive decision trees | 2024-10-23 | Paper |
Proving knowledge of isogenies: a survey Designs, Codes and Cryptography | 2023-11-07 | Paper |
SIDH proof of knowledge Advances in Cryptology – ASIACRYPT 2022 | 2023-08-16 | Paper |
Attack on SHealS and HealS: the second wave of GPST Post-Quantum Cryptography | 2023-07-07 | Paper |
Post-quantum signal key agreement from SIDH Post-Quantum Cryptography | 2023-07-07 | Paper |
Small Superset and Big Subset Obfuscation | 2023-04-13 | Paper |
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage Foundations and Practice of Security | 2022-12-09 | Paper |
Trustless unknown-order groups | 2022-11-29 | Paper |
Failing to hash into supersingular isogeny graphs | 2022-04-29 | Paper |
Obfuscating finite automata | 2022-03-25 | Paper |
On index calculus algorithms for subfield curves | 2022-03-25 | Paper |
Integral matrix Gram root and lattice Gaussian sampling without floats | 2022-03-23 | Paper |
Compact, efficient and UC-secure isogeny-based oblivious transfer | 2021-12-08 | Paper |
Obfuscated fuzzy Hamming distance and conjunctions from subset product problems | 2020-04-30 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems Journal of Cryptology | 2020-03-03 | Paper |
SeaSign: compact isogeny signatures from class group actions | 2020-02-04 | Paper |
Safety in numbers: on the need for robust Diffie-Hellman parameter validation | 2020-01-28 | Paper |
Improved combinatorial algorithms for the inhomogeneous short integer solution problem Journal of Cryptology | 2019-01-29 | Paper |
Finding significant Fourier coefficients: clarifications, simplifications, applications and limitations Chicago Journal of Theoretical Computer Science | 2019-01-29 | Paper |
Computational problems in supersingular elliptic curve isogenies Quantum Information Processing | 2018-11-01 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems Advances in Cryptology – ASIACRYPT 2017 | 2018-04-06 | Paper |
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm Advances in Mathematics of Communications | 2017-10-12 | Paper |
Secure and practical searchable encryption: a position paper | 2017-08-25 | Paper |
Algorithms for the approximate common divisor problem LMS Journal of Computation and Mathematics | 2017-04-04 | Paper |
On the Security of Supersingular Isogeny Cryptosystems Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme Provable Security | 2017-01-06 | Paper |
Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\) Designs, Codes and Cryptography | 2016-02-19 | Paper |
Recent progress on the elliptic curve discrete logarithm problem Designs, Codes and Cryptography | 2016-02-02 | Paper |
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes Lecture Notes in Computer Science | 2015-09-24 | Paper |
The multivariate hidden number problem Lecture Notes in Computer Science | 2015-09-24 | Paper |
Summation polynomial algorithms for elliptic curves in characteristic two Progress in Cryptology -- INDOCRYPT 2014 | 2015-09-10 | Paper |
Kangaroo Methods for Solving the Interval Discrete Logarithm Problem | 2015-01-28 | Paper |
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device Applicable Algebra in Engineering, Communication and Computing | 2014-09-18 | Paper |
Constructing supersingular elliptic curves with a given endomorphism ring LMS Journal of Computation and Mathematics | 2014-09-05 | Paper |
Lattice decoding attacks on binary LWE Information Security and Privacy | 2014-07-24 | Paper |
An improved compression technique for signatures based on learning with errors Topics in Cryptology – CT-RSA 2014 | 2014-03-28 | Paper |
Self-pairings on hyperelliptic curves Journal of Mathematical Cryptology | 2013-09-04 | Paper |
Improved algorithm for the isogeny problem for ordinary elliptic curves Applicable Algebra in Engineering, Communication and Computing | 2013-08-26 | Paper |
Computing discrete logarithms in an interval Mathematics of Computation | 2013-03-20 | Paper |
Endomorphisms for faster elliptic curve cryptography on a large class of curves Journal of Cryptology | 2012-09-21 | Paper |
A non-uniform birthday problem with applications to discrete logarithms Discrete Applied Mathematics | 2012-06-18 | Paper |
Mathematics of public key cryptography. | 2012-04-12 | Paper |
A survey of pairing-based cryptography | 2011-12-01 | Paper |
On the distribution of the coefficients of normal forms for Frobenius expansions Designs, Codes and Cryptography | 2011-08-02 | Paper |
Point compression for Koblitz elliptic curves Advances in Mathematics of Communications | 2011-05-17 | Paper |
Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems Cryptography and Coding | 2010-01-07 | Paper |
Computing pairings using \(x\)-coordinates only Designs, Codes and Cryptography | 2009-03-31 | Paper |
Pairings for cryptographers Discrete Applied Mathematics | 2009-03-04 | Paper |
Aspects of Pairing Inversion IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Pairings on Hyperelliptic Curves with a Real Model Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
The GPS Identification Scheme Using Frobenius Expansions Research in Cryptology | 2009-01-22 | Paper |
Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors Lecture Notes in Computer Science | 2008-05-27 | Paper |
Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction Cryptography and Coding | 2008-03-07 | Paper |
An Analysis of the Vector Decomposition Problem Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Simplified pairing computation and security implications Journal of Mathematical Cryptology | 2008-02-21 | Paper |
Ordinary Abelian varieties having small embedding degree Finite Fields and their Applications | 2008-01-21 | Paper |
Hyperelliptic Pairings Pairing-Based Cryptography – Pairing 2007 | 2007-11-29 | Paper |
Algorithmic Number Theory Lecture Notes in Computer Science | 2007-05-02 | Paper |
Cryptography and Coding Lecture Notes in Computer Science | 2006-11-01 | Paper |
Discrete Logarithms in Generalized Jacobians | 2006-10-02 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Algebraic curves and cryptography Finite Fields and their Applications | 2005-09-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Easy Decision Diffie-Hellman Groups LMS Journal of Computation and Mathematics | 2004-11-18 | Paper |
scientific article; zbMATH DE number 2086697 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2086895 (Why is no real title available?) | 2004-08-11 | Paper |
scientific article; zbMATH DE number 2081083 (Why is no real title available?) | 2004-08-04 | Paper |
scientific article; zbMATH DE number 2079929 (Why is no real title available?) | 2004-08-03 | Paper |
scientific article; zbMATH DE number 1962144 (Why is no real title available?) | 2003-08-10 | Paper |
Rational points on \(X^ +_ 0(N)\) and quadratic \(\mathbb Q\)-curves. Journal de Théorie des Nombres de Bordeaux | 2003-06-30 | Paper |
Limitations of constructive Weil descent | 2003-06-24 | Paper |
Weil descent of Jacobians. Discrete Applied Mathematics | 2003-06-10 | Paper |
scientific article; zbMATH DE number 1360838 (Why is no real title available?) | 2003-05-21 | Paper |
Public key signatures in the multi-user setting. Information Processing Letters | 2003-01-21 | Paper |
The Probability that the Number of Points on an Elliptic Curve over a Finite Field is Prime Journal of the London Mathematical Society | 2002-10-22 | Paper |
Elliptic curve Paillier schemes Journal of Cryptology | 2002-06-27 | Paper |
scientific article; zbMATH DE number 1424181 (Why is no real title available?) | 2002-03-18 | Paper |
Arithmetic on superelliptic curves Mathematics of Computation | 2001-12-10 | Paper |
Weil descent of Jacobians | 2001-10-15 | Paper |
Rational Points on XO+(p) Experimental Mathematics | 2001-05-13 | Paper |
scientific article; zbMATH DE number 1504539 (Why is no real title available?) | 2000-09-12 | Paper |
scientific article; zbMATH DE number 1424171 (Why is no real title available?) | 2000-03-23 | Paper |
Constructing Isogenies between Elliptic Curves Over Finite Fields LMS Journal of Computation and Mathematics | 1999-10-26 | Paper |