Author of the publication

Verifiable Delay Functions from Supersingular Isogenies and Pairings.

, , , and . ASIACRYPT (1), volume 11921 of Lecture Notes in Computer Science, page 248-277. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Torsion point attacks on 'SIDH-like' cryptosystems., and . IET Inf. Secur., 17 (2): 161-170 (March 2023)Semi-commutative Masking: A Framework for Isogeny-Based Protocols, with an Application to Fully Secure Two-Round Isogeny-Based OT., , , and . CANS, volume 12579 of Lecture Notes in Computer Science, page 235-258. Springer, (2020)A New Adaptive Attack on SIDH., and . CT-RSA, volume 13161 of Lecture Notes in Computer Science, page 322-344. Springer, (2022)Another Look at Some Isogeny Hardness Assumptions., , and . CT-RSA, volume 12006 of Lecture Notes in Computer Science, page 496-511. Springer, (2020)Proving knowledge of isogenies - A survey., , , and . IACR Cryptol. ePrint Arch., (2023)SQISign: Compact Post-quantum Signatures from Quaternions and Isogenies., , , , and . ASIACRYPT (1), volume 12491 of Lecture Notes in Computer Science, page 64-93. Springer, (2020)Trapdoor DDH Groups from Pairings and Isogenies., , and . SAC, volume 12804 of Lecture Notes in Computer Science, page 431-450. Springer, (2020)Secure Oblivious Transfer from Semi-Commutative Masking., , , and . IACR Cryptol. ePrint Arch., (2018)Failing to hash into supersingular isogeny graphs., , , , , , , , , and 5 other author(s). IACR Cryptol. ePrint Arch., (2022)Weak instances of SIDH variants under improved torsion-point attacks., , , , and . IACR Cryptol. ePrint Arch., (2020)