default search action
Patrick Longa
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Patrick Longa:
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(3): 445-472 (2023) - [c21]Luca De Feo, Antonin Leroux, Patrick Longa, Benjamin Wesolowski:
New Algorithms for the Deuring Correspondence - Towards Practical and Secure SQISign Signatures. EUROCRYPT (5) 2023: 659-690 - 2022
- [i31]Patrick Longa:
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols. IACR Cryptol. ePrint Arch. 2022: 367 (2022) - 2021
- [c20]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. CRYPTO (3) 2021: 402-431 - [e1]Patrick Longa, Carla Ràfols:
Progress in Cryptology - LATINCRYPT 2021 - 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6-8, 2021, Proceedings. Lecture Notes in Computer Science 12912, Springer 2021, ISBN 978-3-030-88237-2 [contents] - 2020
- [j11]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(2): 245-271 (2020) - [j10]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2020(3): 269-306 (2020) - [j9]Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. IEEE Trans. Dependable Secur. Comput. 17(3): 536-549 (2020) - [c19]Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. ACNS (1) 2020: 441-460 - [c18]Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:
Improved Classical Cryptanalysis of SIKE in Practice. Public Key Cryptography (2) 2020: 505-534 - [i30]Pedro Maat C. Massolino, Patrick Longa, Joost Renes, Lejla Batina:
A Compact and Scalable Hardware/Software Co-design of SIKE. IACR Cryptol. ePrint Arch. 2020: 40 (2020) - [i29]Wen Wang, Shanquan Tian, Bernhard Jungk, Nina Bindel, Patrick Longa, Jakub Szefer:
Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA. IACR Cryptol. ePrint Arch. 2020: 54 (2020) - [i28]Patrick Longa, Wen Wang, Jakub Szefer:
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3. IACR Cryptol. ePrint Arch. 2020: 1457 (2020)
2010 – 2019
- 2019
- [i27]Erdem Alkim, Paulo S. L. M. Barreto, Nina Bindel, Juliane Krämer, Patrick Longa, Jefferson E. Ricardini:
The Lattice-Based Digital Signature Scheme qTESLA. IACR Cryptol. ePrint Arch. 2019: 85 (2019) - [i26]Craig Costello, Patrick Longa, Michael Naehrig, Joost Renes, Fernando Virdia:
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem. IACR Cryptol. ePrint Arch. 2019: 298 (2019) - 2018
- [j8]Zhe Liu, Patrick Longa, Çetin Kaya Koç:
Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances. IEEE Trans. Computers 67(11): 1532-1534 (2018) - [j7]Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2018(3): 1-20 (2018) - [i25]Patrick Longa:
A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies. IACR Cryptol. ePrint Arch. 2018: 267 (2018) - [i24]Hwajeong Seo, Zhe Liu, Patrick Longa, Zhi Hu:
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange. IACR Cryptol. ePrint Arch. 2018: 700 (2018) - 2017
- [j6]Reza Azarderakhsh, Dieter Fishbein, Gurleen Grewal, Shi Hu, David Jao, Patrick Longa, Rajeev Verma:
Fast Software Implementations of Bilinear Pairings. IEEE Trans. Dependable Secur. Comput. 14(6): 605-619 (2017) - [c17]Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks. CHES 2017: 665-686 - [c16]Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik:
Efficient Compression of SIDH Public Keys. EUROCRYPT (1) 2017: 679-706 - [i23]Zhe Liu, Patrick Longa, Geovandro C. C. F. Pereira, Oscar Reparaz, Hwajeong Seo:
FourQ on embedded devices with strong countermeasures against side-channel attacks. IACR Cryptol. ePrint Arch. 2017: 434 (2017) - 2016
- [j5]Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig:
Selecting elliptic curves for cryptography: an efficiency and security analysis. J. Cryptogr. Eng. 6(4): 259-286 (2016) - [c15]Patrick Longa, Michael Naehrig:
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. CANS 2016: 124-139 - [c14]Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. CHES 2016: 517-537 - [c13]Craig Costello, Patrick Longa, Michael Naehrig:
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman. CRYPTO (1) 2016: 572-601 - [c12]Patrick Longa:
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. SAC 2016: 501-519 - [i22]Craig Costello, Patrick Longa, Michael Naehrig:
Efficient algorithms for supersingular isogeny Diffie-Hellman. IACR Cryptol. ePrint Arch. 2016: 413 (2016) - [i21]Patrick Longa, Michael Naehrig:
Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography. IACR Cryptol. ePrint Arch. 2016: 504 (2016) - [i20]Kimmo Järvinen, Andrea Miele, Reza Azarderakhsh, Patrick Longa:
FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields. IACR Cryptol. ePrint Arch. 2016: 569 (2016) - [i19]Patrick Longa:
FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors. IACR Cryptol. ePrint Arch. 2016: 645 (2016) - [i18]Craig Costello, David Jao, Patrick Longa, Michael Naehrig, Joost Renes, David Urbanik:
Efficient compression of SIDH public keys. IACR Cryptol. ePrint Arch. 2016: 963 (2016) - [i17]Paulo S. L. M. Barreto, Patrick Longa, Michael Naehrig, Jefferson E. Ricardini, Gustavo H. M. Zanon:
Sharper Ring-LWE Signatures. IACR Cryptol. ePrint Arch. 2016: 1026 (2016) - 2015
- [j4]Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version). J. Cryptogr. Eng. 5(1): 31-52 (2015) - [c11]Craig Costello, Patrick Longa:
Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime. ASIACRYPT (1) 2015: 214-235 - [i16]Craig Costello, Patrick Longa:
FourQ: four-dimensional decompositions on a Q-curve over the Mersenne prime. IACR Cryptol. ePrint Arch. 2015: 565 (2015) - 2014
- [j3]Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. J. Cryptol. 27(2): 248-283 (2014) - [c10]Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves. CT-RSA 2014: 1-27 - [i15]Joppe W. Bos, Craig Costello, Patrick Longa, Michael Naehrig:
Selecting Elliptic Curves for Cryptography: An Efficiency and Security Analysis. IACR Cryptol. ePrint Arch. 2014: 130 (2014) - 2013
- [c9]Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini:
The Realm of the Pairings. Selected Areas in Cryptography 2013: 3-25 - [i14]Armando Faz-Hernández, Patrick Longa, Ana Helena Sánchez:
Keep Calm and Stay with One (and p>3). IACR Cryptol. ePrint Arch. 2013: 158 (2013) - [i13]Diego F. Aranha, Paulo S. L. M. Barreto, Patrick Longa, Jefferson E. Ricardini:
The Realm of the Pairings. IACR Cryptol. ePrint Arch. 2013: 722 (2013) - 2012
- [j2]Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing the 4-dimensional GLV method on GLS elliptic curves with j-invariant 0. Des. Codes Cryptogr. 63(3): 331-343 (2012) - [c8]Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. ASIACRYPT 2012: 718-739 - [c7]Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao:
Efficient Implementation of Bilinear Pairings on ARM Processors. Selected Areas in Cryptography 2012: 149-165 - [i12]Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao:
Efficient Implementation of Bilinear Pairings on ARM Processors. IACR Cryptol. ePrint Arch. 2012: 408 (2012) - 2011
- [c6]Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López:
Faster Explicit Formulas for Computing Pairings over Ordinary Curves. EUROCRYPT 2011: 48-68 - [i11]Zhi Hu, Patrick Longa, Maozhi Xu:
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0. IACR Cryptol. ePrint Arch. 2011: 315 (2011) - [i10]Peter Birkner, Patrick Longa, Francesco Sica:
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication. IACR Cryptol. ePrint Arch. 2011: 608 (2011) - 2010
- [c5]Patrick Longa, Catherine H. Gebotys:
Efficient Techniques for High-Speed Elliptic Curve Cryptography. CHES 2010: 80-94 - [i9]Patrick Longa, Catherine H. Gebotys:
Efficient Techniques for High-Speed Elliptic Curve Cryptography. IACR Cryptol. ePrint Arch. 2010: 315 (2010) - [i8]Patrick Longa, Catherine H. Gebotys:
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors. IACR Cryptol. ePrint Arch. 2010: 335 (2010) - [i7]Diego F. Aranha, Koray Karabina, Patrick Longa, Catherine H. Gebotys, Julio López:
Faster Explicit Formulas for Computing Pairings over Ordinary Curves. IACR Cryptol. ePrint Arch. 2010: 526 (2010)
2000 – 2009
- 2009
- [c4]Patrick Longa, Catherine H. Gebotys:
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. ACNS 2009: 71-88 - [c3]Patrick Longa, Catherine H. Gebotys:
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. Public Key Cryptography 2009: 443-462 - [i6]Patrick Longa, Catherine H. Gebotys:
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication. IACR Cryptol. ePrint Arch. 2009: 173 (2009) - 2008
- [j1]Patrick Longa, Ali Miri:
Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields. IEEE Trans. Computers 57(3): 289-302 (2008) - [c2]Patrick Longa, Ali Miri:
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields. Public Key Cryptography 2008: 229-247 - [i5]Patrick Longa, Ali Miri:
New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version). IACR Cryptol. ePrint Arch. 2008: 51 (2008) - [i4]Patrick Longa, Ali Miri:
New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version). IACR Cryptol. ePrint Arch. 2008: 52 (2008) - [i3]Patrick Longa:
Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields. IACR Cryptol. ePrint Arch. 2008: 100 (2008) - [i2]Patrick Longa, Catherine H. Gebotys:
Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication. IACR Cryptol. ePrint Arch. 2008: 118 (2008) - [i1]Patrick Longa, Catherine H. Gebotys:
Novel Precomputation Schemes for Elliptic Curve Cryptosystems. IACR Cryptol. ePrint Arch. 2008: 526 (2008) - 2007
- [c1]Patrick Longa, Ali Miri, Miodrag Bolic:
A Flexible Design of Filterbank Architectures for Discrete Wavelet Transforms. ICASSP (3) 2007: 1441-1444
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-27 00:37 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint