| Publication | Date of Publication | Type |
|---|
Homomorphic Encryption Standard Protecting Privacy through Homomorphic Encryption | 2022-11-02 | Paper |
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme Post-Quantum Cryptography | 2022-10-13 | Paper |
On ranks of quadratic twists of a Mordell curve The Ramanujan Journal | 2022-08-26 | Paper |
Pairs of Heron and right triangles with a common area and a common perimeter Publicationes Mathematicae Debrecen | 2022-05-09 | Paper |
Isogenies on twisted Hessian curves Journal of Mathematical Cryptology | 2021-07-14 | Paper |
| On the family of elliptic curves \(X + 1/X + Y + 1/Y + t = 0\) | 2021-05-03 | Paper |
On the rank of elliptic curves arising from Pythagorean quadruplets, II Colloquium Mathematicum | 2021-01-25 | Paper |
Families of elliptic curves of rank \(\geq 5\) over \(\mathbb Q(t)\) Rocky Mountain Journal of Mathematics | 2020-01-17 | Paper |
New mission and opportunity for mathematics researchers: cryptography in the quantum era Advances in Mathematics of Communications | 2019-11-26 | Paper |
| Elliptic curves arising from the triangular numbers | 2019-06-21 | Paper |
| Improved attacks for characteristic-2 parameters of the cubic ABC Simple Matrix Encryption scheme | 2018-09-12 | Paper |
| Key recovery attack on the cubic ABC Simple Matrix Multivariate Encryption Scheme | 2018-02-16 | Paper |
Geometric progressions on elliptic curves Glasnik Matematicki | 2018-01-12 | Paper |
Heron quadrilaterals via elliptic curves Rocky Mountain Journal of Mathematics | 2017-10-12 | Paper |
Integral isosceles triangle-parallelogram and Heron triangle-rhombus pairs with a common area and common perimeter Journal of Number Theory | 2017-08-31 | Paper |
On the rank of elliptic curves with long arithmetic progressions Colloquium Mathematicum | 2017-05-10 | Paper |
| Arithmetic progressions on conics | 2017-01-03 | Paper |
High rank elliptic curves with torsion \(\mathbb Z/4 \mathbb Z\) induced by Kihara's elliptic curves Integers | 2016-10-28 | Paper |
Indifferentiability security of the fast wide pipe hash: breaking the birthday barrier Journal of Mathematical Cryptology | 2016-06-09 | Paper |
Improved indifferentiability security bound for the JH mode Designs, Codes and Cryptography | 2016-05-19 | Paper |
Vulnerabilities of ``McEliece in the world of Escher Post-Quantum Cryptography | 2016-04-26 | Paper |
Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves Mathematics of Computation | 2016-03-23 | Paper |
Character sums determined by low degree isogenies of elliptic curves Rocky Mountain Journal of Mathematics | 2015-08-25 | Paper |
Character sums determined by low degree isogenies of elliptic curves Rocky Mountain Journal of Mathematics | 2015-08-25 | Paper |
Division polynomials for Jacobi quartic curves Proceedings of the 36th international symposium on Symbolic and algebraic computation | 2015-06-09 | Paper |
| On integer solutions of \(x^4+y^4-2z^4-2w^4=0\) | 2015-03-05 | Paper |
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme Post-Quantum Cryptography | 2015-01-14 | Paper |
Elliptic curves arising from Brahmagupta quadrilaterals Bulletin of the Australian Mathematical Society | 2014-08-04 | Paper |
Using \(5\)-isogenies to quintuple points on elliptic curves Information Processing Letters | 2013-03-28 | Paper |
Class numbers via 3-isogenies and elliptic surfaces International Journal of Number Theory | 2013-01-29 | Paper |
| Mean value formulas for twisted Edwards curves | 2012-12-30 | Paper |
Arithmetic progressions on Huff curves Annales Mathematicae et Informaticae | 2012-09-18 | Paper |
Computing isogeny volcanoes of composite degree Applied Mathematics and Computation | 2012-06-11 | Paper |
Isomorphism classes of Edwards curves over finite fields Finite Fields and their Applications | 2012-05-07 | Paper |
Families of elliptic curves with rational 3-torsion Journal of Mathematical Cryptology | 2012-03-22 | Paper |
| Arithmetic progressions on Edwards curves | 2011-02-17 | Paper |
The Diffie-Hellman problem and generalization of Verheul's theorem Designs, Codes and Cryptography | 2009-10-14 | Paper |