| Publication | Date of Publication | Type |
|---|
EdSIDH: supersingular isogeny Diffie-Hellman key exchange on Edwards curves Security, Privacy, and Applied Cryptography Engineering | 2023-11-01 | Paper |
Towards optimized and constant-time CSIDH on embedded devices Constructive Side-Channel Analysis and Secure Design | 2023-10-20 | Paper |
A flexible shared hardware accelerator for NIST-recommended algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA protection Topics in Cryptology – CT-RSA 2023 | 2023-10-04 | Paper |
Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4 Lecture Notes in Computer Science | 2023-08-21 | Paper |
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves Security, Privacy, and Applied Cryptography Engineering | 2022-12-09 | Paper |
| Improved digital signatures based on elliptic curve endomorphism rings | 2022-08-30 | Paper |
High-Performance FPGA Accelerator for SIKE IEEE Transactions on Computers | 2022-08-05 | Paper |
| Faster isogenies for post-quantum cryptography: SIKE | 2022-07-06 | Paper |
| Efficient hardware implementations for elliptic curve cryptography over Curve448 | 2022-07-06 | Paper |
| A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates | 2022-06-15 | Paper |
| Curve448 on 32-bit ARM Cortex-M4 | 2022-03-24 | Paper |
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4 IEEE Transactions on Computers | 2022-03-23 | Paper |
| scientific article; zbMATH DE number 7385899 (Why is no real title available?) | 2021-08-26 | Paper |
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies Financial Cryptography and Data Security | 2021-03-17 | Paper |
| How not to create an isogeny-based PAKE | 2021-02-23 | Paper |
| Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors | 2021-02-23 | Paper |
Efficient Software Implementation of Ring-LWE Encryption on IoT Processors IEEE Transactions on Computers | 2020-10-02 | Paper |
SIKE round 2 speed record on ARM Cortex-M4 Cryptology and Network Security | 2020-07-20 | Paper |
Optimized algorithms and architectures for Montgomery multiplication for post-quantum cryptography Cryptology and Network Security | 2020-07-20 | Paper |
| An exposure model for supersingular isogeny Diffie-Hellman key exchange | 2020-01-21 | Paper |
A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography IEEE Transactions on Computers | 2018-12-04 | Paper |
| Post-quantum static-static key agreement using multiple protocol instances | 2018-04-26 | Paper |
| Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman | 2018-04-26 | Paper |
| Efficient post-quantum undeniable signature on 64-bit ARM | 2018-04-26 | Paper |
| Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields | 2018-02-14 | Paper |
Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases IEEE Transactions on Computers | 2017-07-12 | Paper |
Fast Inversion in <formula formulatype="inline"><tex Notation="TeX">${\schmi{GF(2^m)}}$</tex></formula> with Normal Basis Using Hybrid-Double Multipliers IEEE Transactions on Computers | 2017-06-20 | Paper |
A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms IEEE Transactions on Computers | 2017-06-20 | Paper |
Low-Latency Digit-Serial Systolic Double Basis Multiplier over <formula formulatype="inline"> <tex Notation="TeX">$\mbi GF{(2^m})$</tex> </formula> Using Subquadratic Toeplitz Matrix-Vector Product Approach IEEE Transactions on Computers | 2017-06-20 | Paper |
A Generalization of Addition Chains and Fast Inversions in Binary Fields IEEE Transactions on Computers | 2017-05-16 | Paper |
On fast calculation of addition chains for isogeny-based cryptography Information Security and Cryptology | 2017-05-05 | Paper |
Common Subexpression Algorithms for Space-Complexity Reduction of Gaussian Normal Basis Multiplication IEEE Transactions on Information Theory | 2017-04-28 | Paper |
Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA Progress in Cryptology – INDOCRYPT 2016 | 2016-12-21 | Paper |
Low-resource and fast binary Edwards curves cryptography Progress in Cryptology -- INDOCRYPT 2015 | 2016-01-12 | Paper |
Efficient implementation of bilinear pairings on ARM processors Selected Areas in Cryptography | 2015-12-04 | Paper |
A modified low complexity digit-level Gaussian normal basis multiplier Arithmetic of Finite Fields | 2010-07-20 | Paper |