


default search action
Steven D. Galbraith
Person information
- affiliation: University of Auckland, Department of Mathematics, New Zealand
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j42]Jeremy Booher
, Ross Bowden
, Javad Doliskani
, Tako Boris Fouotsa
, Steven D. Galbraith
, Sabrina Kunzweiler
, Simon-Philipp Merz
, Christophe Petit
, Benjamin Smith, Katherine E. Stange
, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to Hash Into Supersingular Isogeny Graphs. Comput. J. 67(8): 2702-2719 (2024) - [c49]Steven D. Galbraith
, Yi-Fu Lai
, Hart Montgomery
:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. Public Key Cryptography (3) 2024: 36-60 - [i73]Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. IACR Cryptol. ePrint Arch. 2024: 191 (2024) - [i72]Steven D. Galbraith:
Climbing and descending tall volcanos. IACR Cryptol. ePrint Arch. 2024: 924 (2024) - [i71]Steven D. Galbraith, Valerie Gilchrist, Shai Levin, Ari Markowitz:
Further Connections Between Isogenies of Supersingular Curves and Bruhat-Tits Trees. IACR Cryptol. ePrint Arch. 2024: 1971 (2024) - 2023
- [j41]Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:
Guest editorial: Special issue on Mathematics of Zero-Knowledge. Des. Codes Cryptogr. 91(11): 3331-3332 (2023) - [j40]Ward Beullens, Luca De Feo, Steven D. Galbraith
, Christophe Petit
:
Proving knowledge of isogenies: a survey. Des. Codes Cryptogr. 91(11): 3425-3456 (2023) - [c48]Shalini Banerjee
, Steven D. Galbraith
, Tariq Khan
, John Henry Castellanos
, Giovanni Russello
:
Preventing Reverse Engineering of Control Programs in Industrial Control Systems. CPSS@AsiaCCS 2023: 48-59 - [c47]Shalini Banerjee
, Steven D. Galbraith
, Giovanni Russello
:
Obfuscating Evasive Decision Trees. INDOCRYPT (2) 2023: 84-104 - [i70]Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Decision Trees. IACR Cryptol. ePrint Arch. 2023: 68 (2023) - [i69]Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit:
Proving knowledge of isogenies - A survey. IACR Cryptol. ePrint Arch. 2023: 671 (2023) - [i68]Shalini Banerjee, Steven D. Galbraith:
Auditable Obfuscation. IACR Cryptol. ePrint Arch. 2023: 1476 (2023) - [i67]Steven D. Galbraith, Derek Perrin
, José Felipe Voloch:
CSIDH with Level Structure. IACR Cryptol. ePrint Arch. 2023: 1726 (2023) - 2022
- [c46]Luca De Feo
, Samuel Dobson
, Steven D. Galbraith
, Lukas Zobernig
:
SIDH Proof of Knowledge. ASIACRYPT (2) 2022: 310-339 - [c45]Steven D. Galbraith
, Yi-Fu Lai
:
Attack on SHealS and HealS: The Second Wave of GPST. PQCrypto 2022: 399-421 - [c44]Samuel Dobson
, Steven D. Galbraith
:
Post-Quantum Signal Key Agreement from SIDH. PQCrypto 2022: 422-450 - [e11]Steven D. Galbraith
:
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science 13161, Springer 2022, ISBN 978-3-030-95311-9 [contents] - [i66]Jeremy Booher
, Ross Bowden
, Javad Doliskani, Tako Boris Fouotsa
, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent
, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. CoRR abs/2205.00135 (2022) - [i65]Samuel Dobson, Steven D. Galbraith, Benjamin Smith:
Trustless unknown-order groups. CoRR abs/2211.16128 (2022) - [i64]Steven D. Galbraith, Yi-Fu Lai:
Attack on SHealS and HealS: the Second Wave of GPST. IACR Cryptol. ePrint Arch. 2022: 443 (2022) - [i63]Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. IACR Cryptol. ePrint Arch. 2022: 518 (2022) - [i62]Steven D. Galbraith, Trey Li:
Obfuscation of Evasive Algebraic Set Membership. IACR Cryptol. ePrint Arch. 2022: 1516 (2022) - 2021
- [j39]Samuel Dobson
, Steven D. Galbraith
, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig
:
An adaptive attack on 2-SIDH. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 387-404 (2021) - [j38]Shujie Cui
, Xiangfu Song, Muhammad Rizwan Asghar
, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Trans. Priv. Secur. 24(3): 18:1-18:35 (2021) - [c43]Steven D. Galbraith, Trey Li:
Small Superset and Big Subset Obfuscation. ACISP 2021: 68-87 - [c42]Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem
:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. EUROCRYPT (1) 2021: 213-241 - [i61]Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig:
SIDH Proof of Knowledge. IACR Cryptol. ePrint Arch. 2021: 1023 (2021) - [i60]Samuel Dobson, Steven D. Galbraith:
Post-Quantum Signal Key Agreement with SIDH. IACR Cryptol. ePrint Arch. 2021: 1187 (2021) - 2020
- [j37]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j36]Samuel Dobson
, Steven D. Galbraith
, Jason T. LeGrow
, Yan Bo Ti
, Lukas Zobernig
:
An adaptive attack on 2-SIDH. Int. J. Comput. Math. Comput. Syst. Theory 5(4): 282-299 (2020) - [j35]Steven D. Galbraith
, Christophe Petit
, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. J. Cryptol. 33(1): 130-175 (2020) - [c41]Léo Ducas, Steven D. Galbraith
, Thomas Prest
, Yang Yu
:
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats. EUROCRYPT (2) 2020: 608-637 - [c40]Steven D. Galbraith
, Lukas Zobernig
:
Obfuscating Finite Automata. SAC 2020: 90-114 - [c39]Steven D. Galbraith, Robert Granger, Simon-Philipp Merz
, Christophe Petit
:
On Index Calculus Algorithms for Subfield Curves. SAC 2020: 115-138 - [c38]Muhammad Rizwan Asghar
, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - [i59]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-purpose Program Obfuscation. CoRR abs/2011.02607 (2020) - [i58]Samuel Dobson, Steven D. Galbraith:
Trustless Groups of Unknown Order with Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2020: 196 (2020) - [i57]Steven D. Galbraith, Lukas Zobernig:
Obfuscating Finite Automata. IACR Cryptol. ePrint Arch. 2020: 1009 (2020) - [i56]Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. IACR Cryptol. ePrint Arch. 2020: 1012 (2020) - [i55]Steven D. Galbraith, Trey Li:
Big Subset and Small Superset Obfuscation. IACR Cryptol. ePrint Arch. 2020: 1018 (2020) - [i54]Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit:
On Index Calculus Algorithms for Subfield Curves. IACR Cryptol. ePrint Arch. 2020: 1315 (2020)
2010 – 2019
- 2019
- [j34]Shi Bai, Steven D. Galbraith
, Liangze Li, Daniel Sheffield:
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. J. Cryptol. 32(1): 35-83 (2019) - [c37]Luca De Feo
, Steven D. Galbraith
:
SeaSign: Compact Isogeny Signatures from Class Group Actions. EUROCRYPT (3) 2019: 759-789 - [c36]Steven D. Galbraith
, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Public Key Cryptography (2) 2019: 379-407 - [c35]Steven D. Galbraith
, Lukas Zobernig
:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. TCC (1) 2019: 81-110 - [c34]Lukas Zobernig, Steven D. Galbraith
, Giovanni Russello:
When are Opaque Predicates Useful? TrustCom/BigDataSE 2019: 168-175 - [e10]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11921, Springer 2019, ISBN 978-3-030-34577-8 [contents] - [e9]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer 2019, ISBN 978-3-030-34620-1 [contents] - [e8]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11923, Springer 2019, ISBN 978-3-030-34617-1 [contents] - [e7]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i53]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Searchable Databases with Controllable Leakage. CoRR abs/1909.11624 (2019) - [i52]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. IACR Cryptol. ePrint Arch. 2019: 32 (2019) - [i51]Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats. IACR Cryptol. ePrint Arch. 2019: 320 (2019) - [i50]Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. IACR Cryptol. ePrint Arch. 2019: 620 (2019) - [i49]Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
Extending the Adaptive Attack to 2-SIDH. IACR Cryptol. ePrint Arch. 2019: 890 (2019) - [i48]Samuel Dobson, Steven D. Galbraith:
On the Degree-Insensitive SI-GDH problem and assumption. IACR Cryptol. ePrint Arch. 2019: 929 (2019) - 2018
- [j33]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. Chic. J. Theor. Comput. Sci. 2018 (2018) - [j32]Steven D. Galbraith
, Frederik Vercauteren
:
Computational problems in supersingular elliptic curve isogenies. Quantum Inf. Process. 17(10): 265 (2018) - [e6]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5 [contents] - [e5]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6 [contents] - [e4]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6 [contents] - [i47]Steven D. Galbraith, Lorenz Panny, Benjamin Smith
, Frederik Vercauteren:
Quantum Equivalence of the DLP and CDHP for Group Actions. CoRR abs/1812.09116 (2018) - [i46]Steven D. Galbraith:
Authenticated key exchange for SIDH. IACR Cryptol. ePrint Arch. 2018: 266 (2018) - [i45]Luca De Feo, Steven D. Galbraith:
SeaSign: Compact isogeny signatures from class group actions. IACR Cryptol. ePrint Arch. 2018: 824 (2018) - [i44]Steven D. Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren:
Quantum Equivalence of the DLP and CDHP for Group Actions. IACR Cryptol. ePrint Arch. 2018: 1199 (2018) - 2017
- [j31]Steven D. Galbraith
, Ping Wang
, Fangguo Zhang
:
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm. Adv. Math. Commun. 11(3): 453-469 (2017) - [c33]Shujie Cui, Muhammad Rizwan Asghar
, Steven D. Galbraith
, Giovanni Russello:
P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases. CLOUD 2017: 334-341 - [c32]Shujie Cui, Muhammad Rizwan Asghar
, Steven D. Galbraith
, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. ACISP (1) 2017: 266-281 - [c31]Steven D. Galbraith
, Christophe Petit
, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. ASIACRYPT (1) 2017: 3-33 - [c30]Shujie Cui, Muhammad Rizwan Asghar
, Steven D. Galbraith
, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. FPS 2017: 189-205 - [i43]Steven D. Galbraith, Frederik Vercauteren:
Computational problems in supersingular elliptic curve isogenies. IACR Cryptol. ePrint Arch. 2017: 774 (2017) - [i42]Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
Indistinguishable Predicates: A New Tool for Obfuscation. IACR Cryptol. ePrint Arch. 2017: 787 (2017) - 2016
- [j30]Steven D. Galbraith
, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1): 51-72 (2016) - [j29]Christina Delfs, Steven D. Galbraith
:
Computing isogenies between supersingular elliptic curves over 𝔽p. Des. Codes Cryptogr. 78(2): 425-440 (2016) - [j28]Steven D. Galbraith
, Shishay W. Gebregiyorgis, Sean Murphy:
Algorithms for the approximate common divisor problem. LMS J. Comput. Math. 19(A): 58-72 (2016) - [c29]Steven D. Galbraith
, Christophe Petit
, Barak Shani, Yan Bo Ti
:
On the Security of Supersingular Isogeny Cryptosystems. ASIACRYPT (1) 2016: 63-91 - [c28]Zengpeng Li
, Steven D. Galbraith
, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. ProvSec 2016: 373-383 - [i41]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. CoRR abs/1607.01842 (2016) - [i40]Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy:
Algorithms for the Approximate Common Divisor Problem. IACR Cryptol. ePrint Arch. 2016: 215 (2016) - [i39]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. IACR Cryptol. ePrint Arch. 2016: 682 (2016) - [i38]Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti:
On the Security of Supersingular Isogeny Cryptosystems. IACR Cryptol. ePrint Arch. 2016: 859 (2016) - [i37]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 1146 (2016) - [i36]Steven D. Galbraith, Christophe Petit, Javier Silva:
Signature Schemes Based On Supersingular Isogeny Problems. IACR Cryptol. ePrint Arch. 2016: 1154 (2016) - 2015
- [c27]Steven D. Galbraith
, Barak Shani:
The Multivariate Hidden Number Problem. ICITS 2015: 250-268 - [c26]Ricardo Dahab
, Steven D. Galbraith
, Eduardo Morais:
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. ICITS 2015: 283-296 - [i35]Alex Fowler, Steven D. Galbraith:
Kangaroo Methods for Solving the Interval Discrete Logarithm Problem. CoRR abs/1501.07019 (2015) - [i34]Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. IACR Cryptol. ePrint Arch. 2015: 111 (2015) - [i33]Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. IACR Cryptol. ePrint Arch. 2015: 127 (2015) - [i32]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. IACR Cryptol. ePrint Arch. 2015: 605 (2015) - [i31]Steven D. Galbraith, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. IACR Cryptol. ePrint Arch. 2015: 1022 (2015) - 2014
- [j27]Nagarjun C. Dwarakanath, Steven D. Galbraith
:
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device. Appl. Algebra Eng. Commun. Comput. 25(3): 159-180 (2014) - [j26]Steven D. Galbraith
, Chang-An Zhao
:
Erratum Self-pairings on hyperelliptic curves [J. Math. Cryptol. 7(2013), 31-42]. J. Math. Cryptol. 8(1): 93 (2014) - [j25]Ilya Chevyrev
, Steven D. Galbraith
:
Constructing supersingular elliptic curves with a given endomorphism ring. LMS J. Comput. Math. 17(Theory): 71-91 (2014) - [c25]Shi Bai, Steven D. Galbraith
:
Lattice Decoding Attacks on Binary LWE. ACISP 2014: 322-337 - [c24]Shi Bai, Steven D. Galbraith
:
An Improved Compression Technique for Signatures Based on Learning with Errors. CT-RSA 2014: 28-47 - [c23]Steven D. Galbraith
, Shishay W. Gebregiyorgis:
Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. INDOCRYPT 2014: 409-427 - [i30]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Exponential-time Algorithms for Inhomogeneous-SIS. IACR Cryptol. ePrint Arch. 2014: 593 (2014) - [i29]Steven D. Galbraith, Shishay W. Gebregiyorgis:
Summation polynomial algorithms for elliptic curves in characteristic two. IACR Cryptol. ePrint Arch. 2014: 806 (2014) - 2013
- [j24]Steven D. Galbraith
, Anton Stolbunov:
Improved algorithm for the isogeny problem for ordinary elliptic curves. Appl. Algebra Eng. Commun. Comput. 24(2): 107-131 (2013) - [j23]Steven D. Galbraith
, Chang-An Zhao
:
Self-pairings on hyperelliptic curves. J. Math. Cryptol. 7(1): 31-42 (2013) - [j22]Steven D. Galbraith
, John M. Pollard, Raminder S. Ruprai:
Computing discrete logarithms in an interval. Math. Comput. 82(282): 1181-1195 (2013) - [i28]Shi Bai, Steven D. Galbraith:
An improved compression technique for signatures based on learning with errors. IACR Cryptol. ePrint Arch. 2013: 838 (2013) - [i27]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. IACR Cryptol. ePrint Arch. 2013: 839 (2013) - 2012
- [b1]Steven D. Galbraith:
Mathematics of Public Key Cryptography. Cambridge University Press 2012, ISBN 9781107013926 - [j21]Steven D. Galbraith
, Mark Holmes:
A non-uniform birthday problem with applications to discrete logarithms. Discret. Appl. Math. 160(10-11): 1547-1560 (2012) - [e3]Steven D. Galbraith, Mridul Nandi:
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012, ISBN 978-3-642-34930-0 [contents] - [i26]Steven D. Galbraith, Chang-An Zhao:
Self-pairings on Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2012: 267 (2012) - 2011
- [j20]Philip N. J. Eagle, Steven D. Galbraith
, John Ong:
Point compression for Koblitz elliptic curves. Adv. Math. Commun. 5(1): 1-10 (2011) - [j19]Roberto Avanzi, Waldyr D. Benits Junior, Steven D. Galbraith
, James F. McKee:
On the distribution of the coefficients of normal forms for Frobenius expansions. Des. Codes Cryptogr. 61(1): 71-89 (2011) - [j18]Steven D. Galbraith
, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. J. Cryptol. 24(3): 446-469 (2011) - [i25]Steven D. Galbraith, Anton Stolbunov:
Improved Algorithm for the Isogeny Problem for Ordinary Elliptic Curves. CoRR abs/1105.6331 (2011) - 2010
- [c22]Steven D. Galbraith
, Raminder S. Ruprai:
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. Public Key Cryptography 2010: 368-383 - [i24]Steven D. Galbraith, Raminder S. Ruprai:
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. IACR Cryptol. ePrint Arch. 2010: 615 (2010) - [i23]Steven D. Galbraith, Mark Holmes:
A non-uniform birthday problem with applications to discrete logarithms. IACR Cryptol. ePrint Arch. 2010: 616 (2010) - [i22]Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai:
Computing Discrete Logarithms in an Interval. IACR Cryptol. ePrint Arch. 2010: 617 (2010)
2000 – 2009
- 2009
- [j17]Steven D. Galbraith
, Xibin Lin:
Computing pairings using x -coordinates only. Des. Codes Cryptogr. 50(3): 305-324 (2009) - [j16]Steven D. Galbraith
, Jordi Pujolàs
, Christophe Ritzenthaler, Benjamin A. Smith
:
Distortion maps for supersingular genus two curves. J. Math. Cryptol. 3(1): 1-18 (2009) - [c21]Steven D. Galbraith
, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. EUROCRYPT 2009: 518-535 - [c20]Steven D. Galbraith
, Raminder S. Ruprai:
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. IMACC 2009: 368-382 - [i21]Philip N. J. Eagle, Steven D. Galbraith, John Ong:
Point Compression for Koblitz Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 86 (2009) - 2008
- [j15]Steven D. Galbraith, Raminder S. Ruprai:
Computing L-polynomials of non-hyperelliptic genus 4 and 5 curves (abstract only). ACM Commun. Comput. Algebra 42(1-2): 56-57 (2008) - [j14]