Reza Azarderakhsh

From MaRDI portal
(Redirected from Person:831641)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
EdSIDH: supersingular isogeny Diffie-Hellman key exchange on Edwards curves
Security, Privacy, and Applied Cryptography Engineering
2023-11-01Paper
Towards optimized and constant-time CSIDH on embedded devices
Constructive Side-Channel Analysis and Secure Design
2023-10-20Paper
A flexible shared hardware accelerator for NIST-recommended algorithms CRYSTALS-Kyber and CRYSTALS-Dilithium with SCA protection
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Time-efficient finite field microarchitecture design for Curve448 and Ed448 on Cortex-M4
Lecture Notes in Computer Science
2023-08-21Paper
Efficient Software Implementation of Laddering Algorithms Over Binary Elliptic Curves
Security, Privacy, and Applied Cryptography Engineering
2022-12-09Paper
Improved digital signatures based on elliptic curve endomorphism rings2022-08-30Paper
High-Performance FPGA Accelerator for SIKE
IEEE Transactions on Computers
2022-08-05Paper
Faster isogenies for post-quantum cryptography: SIKE2022-07-06Paper
Efficient hardware implementations for elliptic curve cryptography over Curve4482022-07-06Paper
A monolithic hardware implementation of Kyber: comparing apples to apples in PQC candidates2022-06-15Paper
Curve448 on 32-bit ARM Cortex-M42022-03-24Paper
Supersingular Isogeny Key Encapsulation (SIKE) Round 2 on ARM Cortex-M4
IEEE Transactions on Computers
2022-03-23Paper
scientific article; zbMATH DE number 7385899 (Why is no real title available?)2021-08-26Paper
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies
Financial Cryptography and Data Security
2021-03-17Paper
How not to create an isogeny-based PAKE2021-02-23Paper
Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors2021-02-23Paper
Efficient Software Implementation of Ring-LWE Encryption on IoT Processors
IEEE Transactions on Computers
2020-10-02Paper
SIKE round 2 speed record on ARM Cortex-M4
Cryptology and Network Security
2020-07-20Paper
Optimized algorithms and architectures for Montgomery multiplication for post-quantum cryptography
Cryptology and Network Security
2020-07-20Paper
An exposure model for supersingular isogeny Diffie-Hellman key exchange2020-01-21Paper
A High-Performance and Scalable Hardware Architecture for Isogeny-Based Cryptography
IEEE Transactions on Computers
2018-12-04Paper
Post-quantum static-static key agreement using multiple protocol instances2018-04-26Paper
Side-channel attacks on quantum-resistant supersingular isogeny Diffie-Hellman2018-04-26Paper
Efficient post-quantum undeniable signature on 64-bit ARM2018-04-26Paper
Four\(\mathbb {Q}\) on FPGA: new hardware speed records for elliptic curve cryptography over large prime characteristic fields2018-02-14Paper
Low-Complexity Multiplier Architectures for Single and Hybrid-Double Multiplications in Gaussian Normal Bases
IEEE Transactions on Computers
2017-07-12Paper
Fast Inversion in <formula formulatype="inline"><tex Notation="TeX">${\schmi{GF(2^m)}}$</tex></formula> with Normal Basis Using Hybrid-Double Multipliers
IEEE Transactions on Computers
2017-06-20Paper
A New Double Point Multiplication Algorithm and Its Application to Binary Elliptic Curves with Endomorphisms
IEEE Transactions on Computers
2017-06-20Paper
Low-Latency Digit-Serial Systolic Double Basis Multiplier over <formula formulatype="inline"> <tex Notation="TeX">$\mbi GF{(2^m})$</tex> </formula> Using Subquadratic Toeplitz Matrix-Vector Product Approach
IEEE Transactions on Computers
2017-06-20Paper
A Generalization of Addition Chains and Fast Inversions in Binary Fields
IEEE Transactions on Computers
2017-05-16Paper
On fast calculation of addition chains for isogeny-based cryptography
Information Security and Cryptology
2017-05-05Paper
Common Subexpression Algorithms for Space-Complexity Reduction of Gaussian Normal Basis Multiplication
IEEE Transactions on Information Theory
2017-04-28Paper
Fast hardware architectures for supersingular isogeny Diffie-Hellman key exchange on FPGA
Progress in Cryptology – INDOCRYPT 2016
2016-12-21Paper
Low-resource and fast binary Edwards curves cryptography
Progress in Cryptology -- INDOCRYPT 2015
2016-01-12Paper
Efficient implementation of bilinear pairings on ARM processors
Selected Areas in Cryptography
2015-12-04Paper
A modified low complexity digit-level Gaussian normal basis multiplier
Arithmetic of Finite Fields
2010-07-20Paper


Research outcomes over time


This page was built for person: Reza Azarderakhsh