Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh International Conference on Applied Cryptography and Network Security, 481-501, 2020 | 26 | 2020 |
An adaptive attack on 2-SIDH S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020 | 20 | 2020 |
Towards isogeny-based password-authenticated key establishment O Taraskin, V Soukharev, D Jao, JT LeGrow Journal of Mathematical Cryptology 15 (1), 18-30, 2021 | 16* | 2021 |
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez Journal of Mathematical Cryptology 14 (1), 129-138, 2020 | 15* | 2020 |
Cryptanalysis of 'MAKE'. D Brown, N Koblitz, JT LeGrow IACR Cryptol. ePrint Arch. 2021, 465, 2021 | 11 | 2021 |
How Not to Create an Isogeny-Based PAKE R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin International Conference on Applied Cryptography and Network Security, 169-186, 2020 | 7 | 2020 |
(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH JT LeGrow, A Hutchinson International Workshop on Security, 216-226, 2021 | 3* | 2021 |
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs JT LeGrow, DA Pike, J Poulin Designs, Codes and Cryptography 80 (3), 421-433, 2016 | 2 | 2016 |
A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions M Buser, R Dowsley, MF Esgin, C Gritti, SK Kermanshahi, V Kuchta, ... ACM Computing Surveys, 2022 | 1 | 2022 |
Supersingular Non-Superspecial Abelian Surfaces in Cryptography JT LeGrow, YB Ti, L Zobernig Cryptology ePrint Archive, 2022 | | 2022 |
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols JT LeGrow University of Waterloo, 2020 | | 2020 |