| Publication | Date of Publication | Type |
|---|
| Aggregating Falcon signatures with LaBRADOR | 2024-12-04 | Paper |
| 2DT-GLS: faster and exception-free scalar multiplication in the GLS254 binary curve | 2024-10-16 | Paper |
| Privacy-preserving edit distance computation using secret-sharing two-party computation | 2024-10-16 | Paper |
Introducing arithmetic failures to accelerate QC-MDPC code-based cryptography Code-Based Cryptography | 2024-02-23 | Paper |
A survey of elliptic curves for proof systems Designs, Codes and Cryptography | 2023-11-07 | Paper |
Count me in! Extendability for threshold ring signatures Public-Key Cryptography – PKC 2022 | 2023-08-10 | Paper |
The state of the union: union-only signatures for data aggregation Lecture Notes in Computer Science | 2023-07-25 | Paper |
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
A Secure and Efficient Implementation of the Quotient Digital Signature Algorithm (qDSA) Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
\textsf{ECLIPSE}: enhanced compiling method for Pedersen-committed zkSNARK engines Public-Key Cryptography – PKC 2022 | 2022-07-08 | Paper |
| Faster homomorphic encryption over GPGPUs via hierarchical DGT | 2022-06-22 | Paper |
Recovering decimation-based cryptographic sequences by means of linear CAs Logic Journal of the IGPL | 2022-06-16 | Paper |
Recovering decimation-based cryptographic sequences by means of linear CAs Logic Journal of the IGPL | 2022-06-16 | Paper |
| LOVE a pairing | 2022-06-15 | Paper |
| Improved threshold signatures, proactive secret sharing, and input certification from LSS isomorphisms | 2022-06-15 | Paper |
| A differentially private hybrid approach to traffic monitoring | 2022-03-21 | Paper |
| Lattice-based proof of shuffle and applications to electronic voting | 2021-12-20 | Paper |
| Security of hedged Fiat-Shamir signatures under fault attacks | 2021-12-01 | Paper |
| Faster unbalanced private set intersection | 2021-03-17 | Paper |
PRESENT runs fast. Efficient and secure implementation in software Lecture Notes in Computer Science | 2020-06-24 | Paper |
| Curve25519 for the Cortex-M4 and beyond | 2020-03-02 | Paper |
| The simplest multi-key linearly homomorphic signature scheme | 2020-01-14 | Paper |
Binary elligator squared Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
Fast point multiplication algorithms for binary elliptic curves with and without precomputation Selected Areas in Cryptography -- SAC 2014 | 2016-04-13 | Paper |
PUF-based mutual multifactor entity and transaction authentication for secure banking Lecture Notes in Computer Science | 2016-02-22 | Paper |
The realm of the pairings Selected Areas in Cryptography -- SAC 2013 | 2015-10-01 | Paper |
GLV/GLS decomposition, power analysis, and attacks on ECDSA signatures with single-bit nonce bias Lecture Notes in Computer Science | 2015-01-16 | Paper |
\(\lambda\)-coordinates for binary elliptic curves Cryptographic Hardware and Embedded Systems - CHES 2013 | 2013-10-10 | Paper |
Implementing pairings at the 192-bit security level Pairing-Based Cryptography – Pairing 2012 | 2013-04-04 | Paper |
Faster implementation of scalar multiplication on Koblitz curves Progress in Cryptology – LATINCRYPT 2012 | 2012-09-21 | Paper |
Optimal Eta Pairing on Supersingular Genus-2 Binary Hyperelliptic Curves Lecture Notes in Computer Science | 2012-06-08 | Paper |
Parallelizing the Weil and Tate pairings Cryptography and Coding | 2011-12-16 | Paper |
Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication Cryptographic hardware and embedded systems -- CHES 2011. 13th international workshop, Nara, Japan, September 28--October 1, 2011. Proceedings | 2011-10-07 | Paper |
Efficient implementation of elliptic curve cryptography in wireless sensors Advances in Mathematics of Communications | 2011-06-03 | Paper |
Faster explicit formulas for computing pairings over ordinary curves Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Efficient software implementation of binary field arithmetic using vector instruction sets Lecture Notes in Computer Science | 2010-08-31 | Paper |
High-speed parallel software implementation of the \(\eta_{T}\) pairing Topics in Cryptology - CT-RSA 2010 | 2010-03-16 | Paper |