| Publication | Date of Publication | Type |
|---|
| \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves | 2024-12-27 | Paper |
| Polynomial time cryptanalytic extraction of neural network models | 2024-11-13 | Paper |
| Verifiable isogeny walks: towards an isogeny-based postquantum VDF | 2024-10-14 | Paper |
| \textsc{SwiftEC}: Shallue-van de Woestijne indifferentiable function to elliptic curves. Faster indifferentiable hashing to elliptic curves | 2023-08-25 | Paper |
| Parallel isogeny path finding with limited memory | 2023-08-14 | Paper |
| Optimal strategies for CSIDH | 2022-10-18 | Paper |
| Parallel strategies for SIDH: Towards computing SIDH twice as fast | 2022-08-05 | Paper |
| LOVE a pairing | 2022-06-15 | Paper |
| Faulty isogenies: a new kind of leakage | 2022-02-10 | Paper |
| Koblitz curves over quadratic fields | 2019-08-13 | Paper |
| On the cost of computing isogenies between supersingular elliptic curves | 2019-02-20 | Paper |
| A Faster Software Implementation of the Supersingular Isogeny Diffie-Hellman Key Exchange Protocol | 2018-12-04 | Paper |
| Computing discrete logarithms in cryptographically-interesting characteristic-three finite fields | 2018-11-15 | Paper |
| Smoothness test for polynomials defined over small characteristic finite fields | 2018-11-01 | Paper |
| How to (pre-)compute a ladder -- improving the performance of X25519 and X448 | 2018-04-26 | Paper |
| Low-Complexity Bit-Parallel Square Root Computation over GF(2^{m}) for All Trinomials | 2017-11-10 | Paper |
| On Instantiating Pairing-Based Protocols with Elliptic Curves of Embedding Degree One | 2017-09-08 | Paper |
| Low Complexity Cubing and Cube Root Computation over $\F_{3^m}$ in Polynomial Basis | 2017-07-27 | Paper |
| Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes | 2017-07-27 | Paper |
| Fast Architectures for the \eta_T Pairing over Small-Characteristic Supersingular Elliptic Curves | 2017-07-27 | Paper |
| Efficient hardware implementations of brw polynomials and tweakable enciphering schemes | 2017-07-12 | Paper |
| Square Root Computation over Even Extension Fields | 2017-06-20 | Paper |
| Software Implementation of an Attribute-Based Encryption Scheme | 2017-05-16 | Paper |
| Fast point multiplication algorithms for binary elliptic curves with and without precomputation | 2016-04-13 | Paper |
| Computing discrete logarithms in \(\mathbb F_{3^{6 \cdot 137}}\) and \(\mathbb F_{3^{6 \cdot 163}}\) using Magma | 2015-10-01 | Paper |
| Weakness of \(\mathbb{F}_{3^{6 \cdot 1429}}\) and \(\mathbb{F}_{2^{4 \cdot 3041}}\) for discrete logarithm cryptography | 2015-01-30 | Paper |
| Low-cost addition-subtraction sequences for the final exponentiation in pairings | 2014-09-02 | Paper |
| Weakness of $\mathbb{F}_{3^{6 \cdot 509}}$ for Discrete Logarithm Cryptography | 2014-02-18 | Paper |
| \(\lambda\)-coordinates for binary elliptic curves | 2013-10-10 | Paper |
| Implementing pairings at the 192-bit security level | 2013-04-04 | Paper |
| Faster implementation of scalar multiplication on Koblitz curves | 2012-09-21 | Paper |
| Faster hashing to \({\mathbb G}_2\) | 2012-06-08 | Paper |
| Parallelizing the Weil and Tate pairings | 2011-12-16 | Paper |
| Software implementation of binary elliptic curves: impact of the carry-less multiplier on scalar multiplication | 2011-10-07 | Paper |
| High-Speed Software Implementation of the Optimal Ate Pairing over Barreto–Naehrig Curves | 2010-11-26 | Paper |
| Multi-core Implementation of the Tate Pairing over Supersingular Elliptic Curves | 2009-11-26 | Paper |
| Hardware Accelerator for the Tate Pairing in Characteristic Three Based on Karatsuba-Ofman Multipliers | 2009-11-10 | Paper |
| A Comparison between Hardware Accelerators for the Modified Tate Pairing over $\mathbb{F}_{2^m}$ and $\mathbb{F}_{3^m}$ | 2009-02-10 | Paper |
| Parallel formulations of scalar multiplication on Koblitz curves | 2008-08-07 | Paper |
| Comments on: ``How to repair the Hill cipher | 2008-05-26 | Paper |
| Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware | 2008-04-11 | Paper |
| Parallel Itoh-Tsujii multiplicative inversion algorithm for a special class of trinomials | 2007-09-20 | Paper |
| Parallel multipliers based on special irreducible pentanomials | 2007-01-09 | Paper |