Obfuscated fuzzy hamming distance and conjunctions from subset product problems SD Galbraith, L Zobernig
Theory of Cryptography: 17th International Conference, TCC 2019, Nuremberg …, 2019
23 2019 An adaptive attack on 2-SIDH S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
21 2020 SIDH proof of knowledge L De Feo, S Dobson, SD Galbraith, L Zobernig
Advances in Cryptology–ASIACRYPT 2022: 28th International Conference on the …, 2023
19 2023 When are opaque predicates useful? L Zobernig, SD Galbraith, G Russello
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
18 2019 Failing to hash into supersingular isogeny graphs J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, S Kunzweiler, ...
arXiv preprint arXiv:2205.00135, 2022
12 2022 Obfuscating finite automata SD Galbraith, L Zobernig
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
6 2021 A note on a static SIDH protocol S Dobson, T Li, L Zobernig
Cryptology ePrint Archive, 2019
3 2019 Indistinguishable Predicates: A New Tool for Obfuscation. L Zobernig, SD Galbraith, G Russello
IACR Cryptol. ePrint Arch. 2017, 787, 2017
3 2017 Towards a theory of special-purpose program obfuscation MR Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
2 2020 Abelian Varieties with -rank Zero YB Ti, G Verret, L Zobernig
arXiv preprint arXiv:2203.08401, 2022
2022 Supersingular Non-Superspecial Abelian Surfaces in Cryptography JT LeGrow, YB Ti, L Zobernig
Cryptology ePrint Archive, 2022
2022 Genus 2 Curves in Small Characteristic L Zobernig
arXiv preprint arXiv:2111.07270, 2021
2021 Towards a Theory of Special-purpose Program Obfuscation M Rizwan Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
arXiv e-prints, arXiv: 2011.02607, 2020
2020 Mathematical Aspects of Program Obfuscation L Zobernig
PhD Thesis-University of Auckland, 2020
2020 Extending the Adaptive Attack to 2-SIDH. S Dobson, SD Galbraith, JT LeGrow, YB Ti, L Zobernig
IACR Cryptol. ePrint Arch. 2019, 890, 2019
2019 The Modular Subset Product Problem and Obfuscation L Zobernig
Modular Subset Products L Zobernig