| Publication | Date of Publication | Type |
|---|
| Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves | 2024-12-13 | Paper |
| Solving the tensor isomorphism problem for special orbits with low rank points: cryptanalysis and repair of an Asiacrypt 2023 commitment scheme | 2024-12-04 | Paper |
| Malleable commitments from group actions and zero-knowledge proofs for circuits based on isogenies | 2024-10-23 | Paper |
| Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH | 2024-08-30 | Paper |
| M-SIDH and MD-SIDH: countering SIDH attacks by masking information | 2023-12-08 | Paper |
| Proving knowledge of isogenies: a survey | 2023-11-07 | Paper |
| Séta: Supersingular Encryption from Torsion Attacks | 2023-05-26 | Paper |
| SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH | 2023-05-26 | Paper |
| Cryptanalysis of an oblivious PRF from supersingular isogenies | 2023-05-12 | Paper |
| Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT | 2023-03-22 | Paper |
| SQISign: compact post-quantum signatures from quaternions and isogenies | 2023-03-21 | Paper |
| On Adaptive Attacks Against Jao-Urbanik’s Isogeny-Based Protocol | 2022-11-09 | Paper |
| Short Accountable Ring Signatures Based on DDH | 2022-08-19 | Paper |
| Failing to hash into supersingular isogeny graphs | 2022-04-29 | Paper |
| Improved torsion-point attacks on SIDH variants | 2022-04-22 | Paper |
| On index calculus algorithms for subfield curves | 2022-03-25 | Paper |
| Trapdoor DDH groups from pairings and isogenies | 2022-03-25 | Paper |
| One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols | 2021-12-08 | Paper |
| Stronger bounds on the cost of computing Gröbner bases for HFE systems | 2021-09-29 | Paper |
| New results on quasi-subfield polynomials | 2021-09-03 | Paper |
| Supersingular isogeny graphs in cryptography | 2021-02-06 | Paper |
| Another look at some isogeny hardness assumptions | 2020-08-05 | Paper |
| Quasi-subfield polynomials and the elliptic curve discrete logarithm problem | 2020-06-24 | Paper |
| Verifiable delay functions from supersingular isogenies and pairings | 2020-05-20 | Paper |
| Identification protocols and signature schemes based on supersingular isogeny problems | 2020-03-03 | Paper |
| Factoring products of braids via garside normal form | 2020-01-28 | Paper |
| Better path-finding algorithms in LPS Ramanujan graphs | 2019-01-11 | Paper |
| Supersingular isogeny graphs and endomorphism rings: reductions and solutions | 2018-07-17 | Paper |
| A practical cryptanalysis of \({\mathrm {walnutdsa}^{\mathrm {TM}}}\) | 2018-05-16 | Paper |
| Identification protocols and signature schemes based on supersingular isogeny problems | 2018-04-06 | Paper |
| Faster algorithms for isogeny problems using torsion point images | 2018-03-08 | Paper |
| Deterministic root finding in finite fields | 2017-06-22 | Paper |
| A Generalised Successive Resultants Algorithm | 2017-06-13 | Paper |
| On the Security of Supersingular Isogeny Cryptosystems | 2017-02-01 | Paper |
| Improvement of FPPR method to solve ECDLP | 2016-08-12 | Paper |
| Efficient Zero-Knowledge Arguments for Arithmetic Circuits in the Discrete Log Setting | 2016-07-15 | Paper |
| Cryptographic Hash Functions and Expander Graphs: The End of the Story? | 2016-05-02 | Paper |
| Algebraic Approaches for the Elliptic Curve Discrete Logarithm Problem over Prime Fields | 2016-04-13 | Paper |
| Rubik’s for Cryptographers | 2015-10-14 | Paper |
| Improvement of Faugère et al.’s Method to Solve ECDLP | 2014-09-15 | Paper |
| First fall degree and Weil descent | 2014-09-08 | Paper |
| On the quaternion \(\ell\)-isogeny path problem | 2014-09-05 | Paper |
| Finding roots in \(\mathbb F_{p^n}\) with the successive resultants algorithm | 2014-09-05 | Paper |
| On a particular case of the bisymmetric equation for quasigroups | 2014-08-14 | Paper |
| Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) | 2014-04-29 | Paper |
| On Polynomial Systems Arising from a Weil Descent | 2013-03-19 | Paper |
| Improving the Complexity of Index Calculus Algorithms in Elliptic Curves over Binary Fields | 2012-06-29 | Paper |
| Masking with Randomized Look Up Tables | 2012-06-08 | Paper |
| Preimages for the Tillich-Zémor Hash Function | 2011-03-15 | Paper |
| Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security | 2009-04-29 | Paper |
| Full Cryptanalysis of LPS and Morgenstern Hash Functions | 2008-11-20 | Paper |
| Fault Attacks on Public Key Elements: Application to DLP-Based Schemes | 2008-06-12 | Paper |