Jao, David
157  results:
Search for persons X
?
1

Zero-Knowledge Proofs for SIDH Variants with Masked Degree ..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
Mokrani, Youcef ; Jao, David - p. 48-65 , 2024
 
?
2

Generating Supersingular Elliptic Curves over $$\mathbb {F}..:

, In: Lecture Notes in Computer Science; Progress in Cryptology – INDOCRYPT 2023,
Mokrani, Youcef ; Jao, David - p. 159-174 , 2024
 
?
3

Optimal Generic Attack Against Basic Boneh-Boyen Signatures:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Fu, Yen-Kang ; Chang, Jonathan ; Jao, David - p. 505-519 , 2022
 
?
4

Towards Post-Quantum Key-Updatable Public-Key Encryption vi..:

, In: Selected Areas in Cryptography; Lecture Notes in Computer Science,
Eaton, Edward ; Jao, David ; Komlo, Chelsea. - p. 461-482 , 2022
 
?
5

x-only point addition formula and faster compressed SIKE:

Pereira, Geovandro ; Doliskani, Javad ; Jao, David
Journal of Cryptographic Engineering.  11 (2020)  1 - p. 57-69 , 2020
 
?
6

New Techniques for SIDH-based NIKE:

Urbanik, David ; Jao, David
Journal of Mathematical Cryptology.  14 (2020)  1 - p. 120-128 , 2020
 
?
 
?
8

How Not to Create an Isogeny-Based PAKE:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Azarderakhsh, Reza ; Jao, David ; Koziel, Brian... - p. 169-186 , 2020
 
?
9

A subexponential-time, polynomial quantum space algorithm f..:

Jao, David ; LeGrow, Jason ; Leonardi, Christopher.
Journal of Mathematical Cryptology.  14 (2020)  1 - p. 129-138 , 2020
 
?
10

Improved Digital Signatures Based on Elliptic Curve Endomor..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Xu, Xiu ; Leonardi, Chris ; Teh, Anzo... - p. 293-309 , 2019
 
?
11

Towards Optimized and Constant-Time CSIDH on Embedded Devic..:

, In: Constructive Side-Channel Analysis and Secure Design; Lecture Notes in Computer Science,
 
?
12

Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit..:

Jalali, Amir ; Azarderakhsh, Reza ; Kermani, Mehran Mozaffari.
IEEE Transactions on Dependable and Secure Computing.  16 (2019)  5 - p. 902-912 , 2019
 
?
13

SoK : The Problem Landscape of SIDH:

, In: Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop,
Urbanik, David ; Jao, David - p. 53-60 , 2018
 
?
14

EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange o..:

, In: Security, Privacy, and Applied Cryptography Engineering; Lecture Notes in Computer Science,
 
?
15

Fast Software Implementations of Bilinear Pairings:

Azarderakhsh, Reza ; Fishbein, Dieter ; Grewal, Gurleen...
IEEE Transactions on Dependable and Secure Computing.  14 (2017)  6 - p. 605-619 , 2017
 
1-15