Steven D. Galbraith

From MaRDI portal
(Redirected from Person:247139)


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Climbing and descending tall isogeny volcanos
Research in Number Theory
2024-12-16Paper
A simpler and more efficient reduction of DLog to CDH for abelian group actions
 
2024-11-12Paper
Obfuscating evasive decision trees
 
2024-10-23Paper
Proving knowledge of isogenies: a survey
Designs, Codes and Cryptography
2023-11-07Paper
SIDH proof of knowledge
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Attack on SHealS and HealS: the second wave of GPST
Post-Quantum Cryptography
2023-07-07Paper
Post-quantum signal key agreement from SIDH
Post-Quantum Cryptography
2023-07-07Paper
Small Superset and Big Subset Obfuscation
 
2023-04-13Paper
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage
Foundations and Practice of Security
2022-12-09Paper
Trustless unknown-order groups
 
2022-11-29Paper
Failing to hash into supersingular isogeny graphs
 
2022-04-29Paper
Obfuscating finite automata
 
2022-03-25Paper
On index calculus algorithms for subfield curves
 
2022-03-25Paper
Integral matrix Gram root and lattice Gaussian sampling without floats
 
2022-03-23Paper
Compact, efficient and UC-secure isogeny-based oblivious transfer
 
2021-12-08Paper
Obfuscated fuzzy Hamming distance and conjunctions from subset product problems
 
2020-04-30Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Journal of Cryptology
2020-03-03Paper
SeaSign: compact isogeny signatures from class group actions
 
2020-02-04Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation
 
2020-01-28Paper
Improved combinatorial algorithms for the inhomogeneous short integer solution problem
Journal of Cryptology
2019-01-29Paper
Finding significant Fourier coefficients: clarifications, simplifications, applications and limitations
Chicago Journal of Theoretical Computer Science
2019-01-29Paper
Computational problems in supersingular elliptic curve isogenies
Quantum Information Processing
2018-11-01Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Advances in Cryptology – ASIACRYPT 2017
2018-04-06Paper
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm
Advances in Mathematics of Communications
2017-10-12Paper
Secure and practical searchable encryption: a position paper
 
2017-08-25Paper
Algorithms for the approximate common divisor problem
LMS Journal of Computation and Mathematics
2017-04-04Paper
On the Security of Supersingular Isogeny Cryptosystems
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
Provable Security
2017-01-06Paper
Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
Designs, Codes and Cryptography
2016-02-19Paper
Recent progress on the elliptic curve discrete logarithm problem
Designs, Codes and Cryptography
2016-02-02Paper
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Lecture Notes in Computer Science
2015-09-24Paper
The multivariate hidden number problem
Lecture Notes in Computer Science
2015-09-24Paper
Summation polynomial algorithms for elliptic curves in characteristic two
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Kangaroo Methods for Solving the Interval Discrete Logarithm Problem
 
2015-01-28Paper
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
Applicable Algebra in Engineering, Communication and Computing
2014-09-18Paper
Constructing supersingular elliptic curves with a given endomorphism ring
LMS Journal of Computation and Mathematics
2014-09-05Paper
Lattice decoding attacks on binary LWE
Information Security and Privacy
2014-07-24Paper
An improved compression technique for signatures based on learning with errors
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Self-pairings on hyperelliptic curves
Journal of Mathematical Cryptology
2013-09-04Paper
Improved algorithm for the isogeny problem for ordinary elliptic curves
Applicable Algebra in Engineering, Communication and Computing
2013-08-26Paper
Computing discrete logarithms in an interval
Mathematics of Computation
2013-03-20Paper
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Journal of Cryptology
2012-09-21Paper
A non-uniform birthday problem with applications to discrete logarithms
Discrete Applied Mathematics
2012-06-18Paper
Mathematics of public key cryptography.
 
2012-04-12Paper
A survey of pairing-based cryptography
 
2011-12-01Paper
On the distribution of the coefficients of normal forms for Frobenius expansions
Designs, Codes and Cryptography
2011-08-02Paper
Point compression for Koblitz elliptic curves
Advances in Mathematics of Communications
2011-05-17Paper
Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval
Public Key Cryptography – PKC 2010
2010-05-28Paper
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding
2010-01-07Paper
Computing pairings using \(x\)-coordinates only
Designs, Codes and Cryptography
2009-03-31Paper
Pairings for cryptographers
Discrete Applied Mathematics
2009-03-04Paper
Aspects of Pairing Inversion
IEEE Transactions on Information Theory
2009-02-24Paper
Pairings on Hyperelliptic Curves with a Real Model
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology
2009-01-22Paper
Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors
Lecture Notes in Computer Science
2008-05-27Paper
Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction
Cryptography and Coding
2008-03-07Paper
An Analysis of the Vector Decomposition Problem
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Simplified pairing computation and security implications
Journal of Mathematical Cryptology
2008-02-21Paper
Ordinary Abelian varieties having small embedding degree
Finite Fields and their Applications
2008-01-21Paper
Hyperelliptic Pairings
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Algorithmic Number Theory
Lecture Notes in Computer Science
2007-05-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Discrete Logarithms in Generalized Jacobians
 
2006-10-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Algebraic curves and cryptography
Finite Fields and their Applications
2005-09-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Easy Decision Diffie-Hellman Groups
LMS Journal of Computation and Mathematics
2004-11-18Paper
scientific article; zbMATH DE number 2086697 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2086895 (Why is no real title available?)
 
2004-08-11Paper
scientific article; zbMATH DE number 2081083 (Why is no real title available?)
 
2004-08-04Paper
scientific article; zbMATH DE number 2079929 (Why is no real title available?)
 
2004-08-03Paper
scientific article; zbMATH DE number 1962144 (Why is no real title available?)
 
2003-08-10Paper
Rational points on \(X^ +_ 0(N)\) and quadratic \(\mathbb Q\)-curves.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
Limitations of constructive Weil descent
 
2003-06-24Paper
Weil descent of Jacobians.
Discrete Applied Mathematics
2003-06-10Paper
scientific article; zbMATH DE number 1360838 (Why is no real title available?)
 
2003-05-21Paper
Public key signatures in the multi-user setting.
Information Processing Letters
2003-01-21Paper
The Probability that the Number of Points on an Elliptic Curve over a Finite Field is Prime
Journal of the London Mathematical Society
2002-10-22Paper
Elliptic curve Paillier schemes
Journal of Cryptology
2002-06-27Paper
scientific article; zbMATH DE number 1424181 (Why is no real title available?)
 
2002-03-18Paper
Arithmetic on superelliptic curves
Mathematics of Computation
2001-12-10Paper
Weil descent of Jacobians
 
2001-10-15Paper
Rational Points on XO+(p)
Experimental Mathematics
2001-05-13Paper
scientific article; zbMATH DE number 1504539 (Why is no real title available?)
 
2000-09-12Paper
scientific article; zbMATH DE number 1424171 (Why is no real title available?)
 
2000-03-23Paper
Constructing Isogenies between Elliptic Curves Over Finite Fields
LMS Journal of Computation and Mathematics
1999-10-26Paper


Research outcomes over time


This page was built for person: Steven D. Galbraith