Dustin Moody

From MaRDI portal
(Redirected from Person:285238)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Homomorphic Encryption Standard
Protecting Privacy through Homomorphic Encryption
2022-11-02Paper
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme
Post-Quantum Cryptography
2022-10-13Paper
On ranks of quadratic twists of a Mordell curve
The Ramanujan Journal
2022-08-26Paper
Pairs of Heron and right triangles with a common area and a common perimeter
Publicationes Mathematicae Debrecen
2022-05-09Paper
Isogenies on twisted Hessian curves
Journal of Mathematical Cryptology
2021-07-14Paper
On the family of elliptic curves \(X + 1/X + Y + 1/Y + t = 0\)2021-05-03Paper
On the rank of elliptic curves arising from Pythagorean quadruplets, II
Colloquium Mathematicum
2021-01-25Paper
Families of elliptic curves of rank \(\geq 5\) over \(\mathbb Q(t)\)
Rocky Mountain Journal of Mathematics
2020-01-17Paper
New mission and opportunity for mathematics researchers: cryptography in the quantum era
Advances in Mathematics of Communications
2019-11-26Paper
Elliptic curves arising from the triangular numbers2019-06-21Paper
Improved attacks for characteristic-2 parameters of the cubic ABC Simple Matrix Encryption scheme2018-09-12Paper
Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme2018-02-16Paper
Geometric progressions on elliptic curves
Glasnik Matematicki
2018-01-12Paper
Heron quadrilaterals via elliptic curves
Rocky Mountain Journal of Mathematics
2017-10-12Paper
Integral isosceles triangle-parallelogram and Heron triangle-rhombus pairs with a common area and common perimeter
Journal of Number Theory
2017-08-31Paper
On the rank of elliptic curves with long arithmetic progressions
Colloquium Mathematicum
2017-05-10Paper
Arithmetic progressions on conics2017-01-03Paper
High rank elliptic curves with torsion \(\mathbb Z/4 \mathbb Z\) induced by Kihara's elliptic curves
Integers
2016-10-28Paper
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier
Journal of Mathematical Cryptology
2016-06-09Paper
Improved indifferentiability security bound for the JH mode
Designs, Codes and Cryptography
2016-05-19Paper
Vulnerabilities of ``McEliece in the world of Escher
Post-Quantum Cryptography
2016-04-26Paper
Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves
Mathematics of Computation
2016-03-23Paper
Character sums determined by low degree isogenies of elliptic curves
Rocky Mountain Journal of Mathematics
2015-08-25Paper
Character sums determined by low degree isogenies of elliptic curves
Rocky Mountain Journal of Mathematics
2015-08-25Paper
Division polynomials for Jacobi quartic curves
Proceedings of the 36th international symposium on Symbolic and algebraic computation
2015-06-09Paper
On integer solutions of \(x^4+y^4-2z^4-2w^4=0\)2015-03-05Paper
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Post-Quantum Cryptography
2015-01-14Paper
Elliptic curves arising from Brahmagupta quadrilaterals
Bulletin of the Australian Mathematical Society
2014-08-04Paper
Using \(5\)-isogenies to quintuple points on elliptic curves
Information Processing Letters
2013-03-28Paper
Class numbers via 3-isogenies and elliptic surfaces
International Journal of Number Theory
2013-01-29Paper
Mean value formulas for twisted Edwards curves2012-12-30Paper
Arithmetic progressions on Huff curves
Annales Mathematicae et Informaticae
2012-09-18Paper
Computing isogeny volcanoes of composite degree
Applied Mathematics and Computation
2012-06-11Paper
Isomorphism classes of Edwards curves over finite fields
Finite Fields and their Applications
2012-05-07Paper
Families of elliptic curves with rational 3-torsion
Journal of Mathematical Cryptology
2012-03-22Paper
Arithmetic progressions on Edwards curves2011-02-17Paper
The Diffie-Hellman problem and generalization of Verheul's theorem
Designs, Codes and Cryptography
2009-10-14Paper


Research outcomes over time


This page was built for person: Dustin Moody