Publication | Date of Publication | Type |
---|
M-SIDH and MD-SIDH: countering SIDH attacks by masking information | 2023-12-08 | Paper |
Proving knowledge of isogenies: a survey | 2023-11-07 | Paper |
Séta: Supersingular Encryption from Torsion Attacks | 2023-05-26 | Paper |
SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH | 2023-05-26 | Paper |
Cryptanalysis of an oblivious PRF from supersingular isogenies | 2023-05-12 | Paper |
Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT | 2023-03-22 | Paper |
SQISign: compact post-quantum signatures from quaternions and isogenies | 2023-03-21 | Paper |
On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol | 2022-11-09 | Paper |
Short Accountable Ring Signatures Based on DDH | 2022-08-19 | Paper |
Failing to hash into supersingular isogeny graphs | 2022-04-29 | Paper |
Improved torsion-point attacks on SIDH variants | 2022-04-22 | Paper |
On index calculus algorithms for subfield curves | 2022-03-25 | Paper |
Trapdoor DDH groups from pairings and isogenies | 2022-03-25 | Paper |
One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols | 2021-12-08 | Paper |
Stronger bounds on the cost of computing Gröbner bases for HFE systems | 2021-09-29 | Paper |
New results on quasi-subfield polynomials | 2021-09-03 | Paper |
Supersingular isogeny graphs in cryptography | 2021-02-06 | Paper |
Another look at some isogeny hardness assumptions | 2020-08-05 | Paper |
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem | 2020-06-24 | Paper |
Verifiable delay functions from supersingular isogenies and pairings | 2020-05-20 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems | 2020-03-03 | Paper |
Factoring products of braids via garside normal form | 2020-01-28 | Paper |
Better path-finding algorithms in LPS Ramanujan graphs | 2019-01-11 | Paper |
Supersingular isogeny graphs and endomorphism rings: reductions and solutions | 2018-07-17 | Paper |
A practical cryptanalysis of \({\mathrm {walnutdsa}^{\mathrm {TM}}}\) | 2018-05-16 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems | 2018-04-06 | Paper |
Faster algorithms for isogeny problems using torsion point images | 2018-03-08 | Paper |
Deterministic root finding in finite fields | 2017-06-22 | Paper |
A Generalised Successive Resultants Algorithm | 2017-06-13 | Paper |
On the Security of Supersingular Isogeny Cryptosystems | 2017-02-01 | Paper |
Improvement of FPPR method to solve ECDLP | 2016-08-12 | Paper |
Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting | 2016-07-15 | Paper |
Cryptographic Hash Functions and Expander Graphs: The End of the Story? | 2016-05-02 | Paper |
Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields | 2016-04-13 | Paper |
Rubik’s for Cryptographers | 2015-10-14 | Paper |
Improvement of Faugère et al.’s Method to Solve ECDLP | 2014-09-15 | Paper |
First fall degree and Weil descent | 2014-09-08 | Paper |
Finding roots in with the successive resultants algorithm | 2014-09-05 | Paper |
On the quaternion -isogeny path problem | 2014-09-05 | Paper |
On a particular case of the bisymmetric equation for quasigroups | 2014-08-14 | Paper |
Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) | 2014-04-29 | Paper |
On Polynomial Systems Arising from a Weil Descent | 2013-03-19 | Paper |
Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields | 2012-06-29 | Paper |
Masking with Randomized Look Up Tables | 2012-06-08 | Paper |
Preimages for the Tillich-Zémor Hash Function | 2011-03-15 | Paper |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security | 2009-04-29 | Paper |
Full Cryptanalysis of LPS and Morgenstern Hash Functions | 2008-11-20 | Paper |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes | 2008-06-12 | Paper |