Steven D. Galbraith

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Improved algorithms for ascending isogeny volcanoes, and applications2026-02-19Paper
Breaking and improving a lattice-code-based cryptosystem by Li, Ling, Xing, and Yeo
IEEE Transactions on Information Theory
2025-10-06Paper
Obfuscation of evasive algebraic set membership
Advances in Mathematics of Communications
2025-02-17Paper
Climbing and descending tall isogeny volcanos
Research in Number Theory
2024-12-16Paper
A simpler and more efficient reduction of DLog to CDH for abelian group actions2024-11-12Paper
Obfuscating evasive decision trees2024-10-23Paper
Proving knowledge of isogenies: a survey
Designs, Codes and Cryptography
2023-11-07Paper
SIDH proof of knowledge
Advances in Cryptology – ASIACRYPT 2022
2023-08-16Paper
Attack on SHealS and HealS: the second wave of GPST
Post-Quantum Cryptography
2023-07-07Paper
Post-quantum signal key agreement from SIDH
Post-Quantum Cryptography
2023-07-07Paper
Small Superset and Big Subset Obfuscation2023-04-13Paper
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage
Foundations and Practice of Security
2022-12-09Paper
Trustless unknown-order groups2022-11-29Paper
Failing to hash into supersingular isogeny graphs2022-04-29Paper
Obfuscating finite automata2022-03-25Paper
On index calculus algorithms for subfield curves2022-03-25Paper
Integral matrix Gram root and lattice Gaussian sampling without floats2022-03-23Paper
Compact, efficient and UC-secure isogeny-based oblivious transfer2021-12-08Paper
Obfuscated fuzzy Hamming distance and conjunctions from subset product problems2020-04-30Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Journal of Cryptology
2020-03-03Paper
SeaSign: compact isogeny signatures from class group actions2020-02-04Paper
Safety in numbers: on the need for robust Diffie-Hellman parameter validation2020-01-28Paper
Improved combinatorial algorithms for the inhomogeneous short integer solution problem
Journal of Cryptology
2019-01-29Paper
Finding significant Fourier coefficients: clarifications, simplifications, applications and limitations
Chicago Journal of Theoretical Computer Science
2019-01-29Paper
Computational problems in supersingular elliptic curve isogenies
Quantum Information Processing
2018-11-01Paper
Identification protocols and signature schemes based on supersingular isogeny problems
Advances in Cryptology – ASIACRYPT 2017
2018-04-06Paper
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm
Advances in Mathematics of Communications
2017-10-12Paper
Secure and practical searchable encryption: a position paper2017-08-25Paper
Algorithms for the approximate common divisor problem
LMS Journal of Computation and Mathematics
2017-04-04Paper
On the Security of Supersingular Isogeny Cryptosystems
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Preventing adaptive key recovery attacks on the GSW levelled homomorphic encryption scheme
Provable Security
2017-01-06Paper
Computing isogenies between supersingular elliptic curves over \(\mathbb {F}_p\)
Designs, Codes and Cryptography
2016-02-19Paper
Recent progress on the elliptic curve discrete logarithm problem
Designs, Codes and Cryptography
2016-02-02Paper
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes
Lecture Notes in Computer Science
2015-09-24Paper
The multivariate hidden number problem
Lecture Notes in Computer Science
2015-09-24Paper
Summation polynomial algorithms for elliptic curves in characteristic two
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Kangaroo Methods for Solving the Interval Discrete Logarithm Problem2015-01-28Paper
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device
Applicable Algebra in Engineering, Communication and Computing
2014-09-18Paper
Constructing supersingular elliptic curves with a given endomorphism ring
LMS Journal of Computation and Mathematics
2014-09-05Paper
Lattice decoding attacks on binary LWE
Information Security and Privacy
2014-07-24Paper
An improved compression technique for signatures based on learning with errors
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Self-pairings on hyperelliptic curves
Journal of Mathematical Cryptology
2013-09-04Paper
Improved algorithm for the isogeny problem for ordinary elliptic curves
Applicable Algebra in Engineering, Communication and Computing
2013-08-26Paper
Computing discrete logarithms in an interval
Mathematics of Computation
2013-03-20Paper
Endomorphisms for faster elliptic curve cryptography on a large class of curves
Journal of Cryptology
2012-09-21Paper
A non-uniform birthday problem with applications to discrete logarithms
Discrete Applied Mathematics
2012-06-18Paper
Mathematics of public key cryptography.2012-04-12Paper
A survey of pairing-based cryptography2011-12-01Paper
On the distribution of the coefficients of normal forms for Frobenius expansions
Designs, Codes and Cryptography
2011-08-02Paper
Point compression for Koblitz elliptic curves
Advances in Mathematics of Communications
2011-05-17Paper
Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval
Public Key Cryptography – PKC 2010
2010-05-28Paper
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding
2010-01-07Paper
Computing pairings using x-coordinates only
Designs, Codes and Cryptography
2009-03-31Paper
Pairings for cryptographers
Discrete Applied Mathematics
2009-03-04Paper
Aspects of Pairing Inversion
IEEE Transactions on Information Theory
2009-02-24Paper
Pairings on Hyperelliptic Curves with a Real Model
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
The GPS Identification Scheme Using Frobenius Expansions
Research in Cryptology
2009-01-22Paper
Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors
Lecture Notes in Computer Science
2008-05-27Paper
Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction
Cryptography and Coding
2008-03-07Paper
An Analysis of the Vector Decomposition Problem
Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings
2008-03-05Paper
Simplified pairing computation and security implications
Journal of Mathematical Cryptology
2008-02-21Paper
Ordinary Abelian varieties having small embedding degree
Finite Fields and their Applications
2008-01-21Paper
Hyperelliptic Pairings
Pairing-Based Cryptography – Pairing 2007
2007-11-29Paper
Algorithmic Number Theory
Lecture Notes in Computer Science
2007-05-02Paper
Cryptography and Coding
Lecture Notes in Computer Science
2006-11-01Paper
Discrete Logarithms in Generalized Jacobians2006-10-02Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Algebraic curves and cryptography
Finite Fields and their Applications
2005-09-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Easy Decision Diffie-Hellman Groups
LMS Journal of Computation and Mathematics
2004-11-18Paper
Easy Decision Diffie-Hellman Groups
LMS Journal of Computation and Mathematics
2004-11-18Paper
scientific article; zbMATH DE number 2086697 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2086895 (Why is no real title available?)2004-08-11Paper
scientific article; zbMATH DE number 2081083 (Why is no real title available?)2004-08-04Paper
scientific article; zbMATH DE number 2079929 (Why is no real title available?)2004-08-03Paper
scientific article; zbMATH DE number 1962144 (Why is no real title available?)2003-08-10Paper
Rational points on \(X^ +_ 0(N)\) and quadratic \(\mathbb Q\)-curves.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
Rational points on \(X^ +_ 0(N)\) and quadratic \(\mathbb Q\)-curves.
Journal de Théorie des Nombres de Bordeaux
2003-06-30Paper
Limitations of constructive Weil descent2003-06-24Paper
Weil descent of Jacobians.
Discrete Applied Mathematics
2003-06-10Paper
scientific article; zbMATH DE number 1360838 (Why is no real title available?)2003-05-21Paper
Public key signatures in the multi-user setting.
Information Processing Letters
2003-01-21Paper
The Probability that the Number of Points on an Elliptic Curve over a Finite Field is Prime
Journal of the London Mathematical Society
2002-10-22Paper
Elliptic curve Paillier schemes
Journal of Cryptology
2002-06-27Paper
scientific article; zbMATH DE number 1424181 (Why is no real title available?)2002-03-18Paper
Arithmetic on superelliptic curves
Mathematics of Computation
2001-12-10Paper
Weil descent of Jacobians2001-10-15Paper
Rational Points on X<sub>O</sub><sup>+</sup>(p)
Experimental Mathematics
2001-05-13Paper
scientific article; zbMATH DE number 1504539 (Why is no real title available?)2000-09-12Paper
scientific article; zbMATH DE number 1424171 (Why is no real title available?)2000-03-23Paper
Constructing Isogenies between Elliptic Curves Over Finite Fields
LMS Journal of Computation and Mathematics
1999-10-26Paper


Research outcomes over time


This page was built for person: Steven D. Galbraith