Jason LeGrow
Jason LeGrow
Geverifieerd e-mailadres voor vt.edu
Geciteerd door
Geciteerd door
Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh
International Conference on Applied Cryptography and Network Security, 481-501, 2020
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
Towards isogeny-based password-authenticated key establishment
O Taraskin, V Soukharev, D Jao, JT LeGrow
Journal of Mathematical Cryptology 15 (1), 18-30, 2021
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez
Journal of Mathematical Cryptology 14 (1), 129-138, 2020
Cryptanalysis of 'MAKE'.
D Brown, N Koblitz, JT LeGrow
IACR Cryptol. ePrint Arch. 2021, 465, 2021
How Not to Create an Isogeny-Based PAKE
R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin
International Conference on Applied Cryptography and Network Security, 169-186, 2020
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH
JT LeGrow, A Hutchinson
International Workshop on Security, 216-226, 2021
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs
JT LeGrow, DA Pike, J Poulin
Designs, Codes and Cryptography 80 (3), 421-433, 2016
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions
M Buser, R Dowsley, MF Esgin, C Gritti, SK Kermanshahi, V Kuchta, ...
ACM Computing Surveys, 2022
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
JT LeGrow, YB Ti, L Zobernig
Cryptology ePrint Archive, 2022
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols
JT LeGrow
University of Waterloo, 2020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–11