Obserwuj
Jesús-Javier Chi-Domínguez
Jesús-Javier Chi-Domínguez
Technology Innovation Institute (TII), Abu Dhabi, UAE
Zweryfikowany adres z tii.ae - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
On the cost of computing isogenies between supersingular elliptic curves
G Adj, D Cervantes-Vázquez, JJ Chi-Domínguez, A Menezes, ...
International Conference on Selected Areas in Cryptography, 322-343, 2018
1312018
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
J Chávez-Saab, JJ Chi-Domínguez, S Jaques, F Rodríguez-Henríquez
IACR Cryptol. ePrint Arch. 2020, 1520, 2020
772020
Stronger and faster side-channel protections for CSIDH
D Cervantes-Vázquez, M Chenu, JJ Chi-Domínguez, L De Feo, ...
Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019
702019
Optimal strategies for CSIDH
JJ Chi-Domínguez, F Rodríguez-Henríquez
Cryptology ePrint Archive, 2020
382020
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
G Adj, JJ Chi-Domínguez, F Rodríguez-Henríquez
IACR Cryptol. ePrint Arch. 2020, 1109, 2020
32*2020
Set it and forget it! Turnkey ECC for instant integration
D Belyavsky, BB Brumley, JJ Chi-Domínguez, L Rivera-Zamarripa, ...
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
122020
Optimizations and Practicality of High-Security CSIDH
F Campos, J Chávez-Saab, JJ Chi-Domínguez, M Meyer, K Reijnders, ...
10*2024
Fully projective radical isogenies in constant-time
JJ Chi-Domínguez, K Reijnders
IACR Cryptol. ePrint Arch. 2021, 259, 2021
102021
Déjà Vu: Side-Channel Analysis of Mozilla's NSS
SU Hassan, I Gridin, IM Delgado-Lozano, CP García, JJ Chi-Domínguez, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
82020
MIRA
N Aragon, M Bardet, L Bidoux, JJ Chi-Domínguez, V Dyseryn, T Feneuil, ...
NIST Round 1, 199, 2023
72023
Faulty isogenies: a new kind of leakage
G Adj, JJ Chi-Domínguez, V Mateu, F Rodríguez-Henríquez
arXiv preprint arXiv:2202.04896, 2022
72022
Attacking a binary GLS elliptic curve with magma
JJ Chi, T Oliveira
Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015
72015
Parallel isogeny path finding with limited memory
E Bellini, J Chavez-Saab, JJ Chi-Domínguez, A Esser, S Ionica, ...
International Conference on Cryptology in India, 294-316, 2022
62022
Properties of Lattice Isomorphism as a Cryptographic Group Action
B Benčina, A Budroni, JJ Chi-Domínguez, M Kulkarni
International Conference on Post-Quantum Cryptography, 170-201, 2024
5*2024
Mira: a digital signature scheme based on the minrank problem and the mpc-in-the-head paradigm
N Aragon, L Bidoux, JJ Chi-Domínguez, T Feneuil, P Gaborit, R Neveu, ...
arXiv preprint arXiv:2307.08575, 2023
52023
RYDE
N Aragon, M Bardet, L Bidoux, JJ Chi-Domínguez, V Dyseryn, T Feneuil, ...
Round 1, 22, 2023
52023
Computing Isogenies of Power-Smooth Degrees Between PPAVs
JJ Chi-Domínguez, A Pizarro-Madariaga, E Riquelme
Cryptology ePrint Archive, 2023
5*2023
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
Lecture Notes in Computer Science. In preparation. Springer, 2021
52021
A Note on constructing SIDH-pok-based signatures after castryck-decru attack
JJ Chi-Domínguez
Cryptology ePrint Archive, 2022
42022
Don’t use it twice! solving relaxed linear code equivalence problems
A Budroni, JJ Chi-Domínguez, G D'Alconzo, AJ Di Scala, M Kulkarni
Cryptology ePrint Archive, 2024
32024
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20