| Publication | Date of Publication | Type |
|---|
| \(\mathrm{KLPT}^2\): algebraic pathfinding in dimension two and applications | 2026-02-04 | Paper |
| Computing the endomorphism ring of a supersingular elliptic curve from a full rank suborder | 2025-12-02 | Paper |
| Radical 2-isogenies and cryptographic hash functions in dimensions 1, 2 and 3 | 2025-07-29 | Paper |
| Faster algorithms for isogeny computations over extensions of finite fields | 2025-04-15 | Paper |
| Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves | 2024-12-13 | Paper |
| Solving the tensor isomorphism problem for special orbits with low rank points: cryptanalysis and repair of an Asiacrypt 2023 commitment scheme | 2024-12-04 | Paper |
| Malleable commitments from group actions and zero-knowledge proofs for circuits based on isogenies | 2024-10-23 | Paper |
| Hidden stabilizers, the isogeny to endomorphism ring problem and the cryptanalysis of pSIDH | 2024-08-30 | Paper |
M-SIDH and MD-SIDH: countering SIDH attacks by masking information Advances in Cryptology – EUROCRYPT 2023 | 2023-12-08 | Paper |
Proving knowledge of isogenies: a survey Designs, Codes and Cryptography | 2023-11-07 | Paper |
Séta: Supersingular Encryption from Torsion Attacks Lecture Notes in Computer Science | 2023-05-26 | Paper |
SHealS and HealS: Isogeny-Based PKEs from a Key Validation Method for SIDH Lecture Notes in Computer Science | 2023-05-26 | Paper |
Cryptanalysis of an oblivious PRF from supersingular isogenies Lecture Notes in Computer Science | 2023-05-12 | Paper |
| Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT | 2023-03-22 | Paper |
| SQISign: compact post-quantum signatures from quaternions and isogenies | 2023-03-21 | Paper |
On adaptive attacks against Jao-Urbanik's isogeny-based protocol Progress in Cryptology - AFRICACRYPT 2020 | 2022-11-09 | Paper |
Short accountable ring signatures based on DDH Computer Security -- ESORICS 2015 | 2022-08-19 | Paper |
| Failing to hash into supersingular isogeny graphs | 2022-04-29 | Paper |
Improved torsion-point attacks on SIDH variants (available as arXiv preprint) | 2022-04-22 | Paper |
| On index calculus algorithms for subfield curves | 2022-03-25 | Paper |
| Trapdoor DDH groups from pairings and isogenies | 2022-03-25 | Paper |
| One-way functions and malleability oracles: hidden shift attacks on isogeny-based protocols | 2021-12-08 | Paper |
Stronger bounds on the cost of computing Gröbner bases for HFE systems Journal of Symbolic Computation | 2021-09-29 | Paper |
New results on quasi-subfield polynomials Finite Fields and their Applications | 2021-09-03 | Paper |
Supersingular isogeny graphs in cryptography Surveys in Combinatorics 2019 | 2021-02-06 | Paper |
| Another look at some isogeny hardness assumptions | 2020-08-05 | Paper |
Quasi-subfield polynomials and the elliptic curve discrete logarithm problem Journal of Mathematical Cryptology | 2020-06-24 | Paper |
| Verifiable delay functions from supersingular isogenies and pairings | 2020-05-20 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems Journal of Cryptology | 2020-03-03 | Paper |
| Factoring products of braids via Garside normal form | 2020-01-28 | Paper |
Better path-finding algorithms in LPS Ramanujan graphs Journal of Mathematical Cryptology | 2019-01-11 | Paper |
| Supersingular isogeny graphs and endomorphism rings: reductions and solutions | 2018-07-17 | Paper |
| A practical cryptanalysis of \({\mathrm {walnutdsa}^{\mathrm {TM}}}\) | 2018-05-16 | Paper |
Identification protocols and signature schemes based on supersingular isogeny problems Advances in Cryptology – ASIACRYPT 2017 | 2018-04-06 | Paper |
| Faster algorithms for isogeny problems using torsion point images | 2018-03-08 | Paper |
Deterministic root finding in finite fields ACM Communications in Computer Algebra | 2017-06-22 | Paper |
A generalized successive resultants algorithm Arithmetic of Finite Fields | 2017-06-13 | Paper |
On the Security of Supersingular Isogeny Cryptosystems Advances in Cryptology – ASIACRYPT 2016 | 2017-02-01 | Paper |
Improvement of FPPR method to solve ECDLP Pacific Journal of Mathematics for Industry | 2016-08-12 | Paper |
Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting Advances in Cryptology – EUROCRYPT 2016 | 2016-07-15 | Paper |
Cryptographic hash functions and expander graphs: the end of the story? The New Codebreakers | 2016-05-02 | Paper |
Algebraic approaches for the elliptic curve discrete logarithm problem over prime fields Public-Key Cryptography – PKC 2016 | 2016-04-13 | Paper |
Rubik’s for Cryptographers Notices of the American Mathematical Society | 2015-10-14 | Paper |
Improvement of Faugère et al.'s method to solve ECDLP Advances in Information and Computer Security | 2014-09-15 | Paper |
First fall degree and Weil descent Finite Fields and their Applications | 2014-09-08 | Paper |
On the quaternion \(\ell\)-isogeny path problem LMS Journal of Computation and Mathematics | 2014-09-05 | Paper |
Finding roots in \(\mathbb F_{p^n}\) with the successive resultants algorithm LMS Journal of Computation and Mathematics | 2014-09-05 | Paper |
On a particular case of the bisymmetric equation for quasigroups Acta Mathematica Hungarica | 2014-08-14 | Paper |
Towards factoring in \(\mathrm{SL}(2,\mathbb F_{2^n})\) Designs, Codes and Cryptography | 2014-04-29 | Paper |
On polynomial systems arising from a Weil descent Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Improving the complexity of index calculus algorithms in elliptic curves over binary fields Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Masking with randomized look up tables. Towards preventing side-channel attacks of all orders Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Preimages for the Tillich-Zémor hash function Selected Areas in Cryptography | 2011-03-15 | Paper |
Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security Topics in Cryptology – CT-RSA 2009 | 2009-04-29 | Paper |
Full Cryptanalysis of LPS and Morgenstern Hash Functions Lecture Notes in Computer Science | 2008-11-20 | Paper |
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes Public Key Infrastructure | 2008-06-12 | Paper |