Jason LeGrow
Cytowane przez
Cytowane przez
Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh
Applied Cryptography and Network Security: 18th International Conference …, 2020
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
Towards isogeny-based password-authenticated key establishment
O Taraskin, V Soukharev, D Jao, JT LeGrow
Journal of Mathematical Cryptology 15 (1), 18-30, 2020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez
Journal of Mathematical Cryptology 14 (1), 129-138, 2020
Cryptanalysis of 'MAKE'.
D Brown, N Koblitz, JT LeGrow
IACR Cryptol. ePrint Arch. 2021, 465, 2021
How not to create an isogeny-based PAKE
R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin
Applied Cryptography and Network Security: 18th International Conference …, 2020
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
JT LeGrow, A Hutchinson
Advances in Information and Computer Security: 16th International Workshop …, 2021
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs
JT LeGrow, DA Pike, J Poulin
Designs, Codes and Cryptography 80 (3), 421-433, 2016
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
JT LeGrow, YB Ti, L Zobernig
Cryptology ePrint Archive, 2022
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols
JT LeGrow
University of Waterloo, 2020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–11