Author of the publication

On the Isogeny Problem with Torsion Point Information.

, , , and . Public Key Cryptography (1), volume 13177 of Lecture Notes in Computer Science, page 142-161. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Splitting quaternion algebras over quadratic number fields.. CoRR, (2016)Trapdoor DDH groups from pairings and isogenies., , and . IACR Cryptol. ePrint Arch., (2019)Improved algorithms for finding fixed-degree isogenies between supersingular elliptic curves., , , , , and . IACR Cryptol. ePrint Arch., (2023)Hidden Stabilizers, the Isogeny to Endomorphism Ring Problem and the Cryptanalysis of pSIDH., , , , , and . ASIACRYPT (3), volume 14440 of Lecture Notes in Computer Science, page 99-130. Springer, (2023)SCALLOP: Scaling the CSI-FiSh., , , , , , and . Public Key Cryptography (1), volume 13940 of Lecture Notes in Computer Science, page 345-375. Springer, (2023)One-Way Functions and Malleability Oracles: Hidden Shift Attacks on Isogeny-Based Protocols., , , and . EUROCRYPT (1), volume 12696 of Lecture Notes in Computer Science, page 242-271. Springer, (2021)Computing Explicit Isomorphisms with Full Matrix Algebras over Fq(x)., , and . Found. Comput. Math., 18 (2): 381-397 (2018)Computing explicit isomorphisms with full matrix algebras over $F_q(x)$., , and . CoRR, (2015)Torsion point attacks on "SIDH-like" cryptosystems., and . IACR Cryptol. ePrint Arch., (2022)Séta: Supersingular Encryption from Torsion Attacks., , , , , , , and . ASIACRYPT (4), volume 13093 of Lecture Notes in Computer Science, page 249-278. Springer, (2021)