Sike D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ... National Institute of Standards and Technology, Technical report, 2020 | 61 | 2020 |
Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh Applied Cryptography and Network Security: 18th International Conference …, 2020 | 44 | 2020 |
SIKE: Supersingular isogeny key encapsulation (2017) D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ... Manuscript available at sike. org, 0 | 24 | |
Constructing canonical strategies for parallel implementation of isogeny based cryptography A Hutchinson, K Karabina International Conference on Cryptology in India, 169-189, 2018 | 14 | 2018 |
Constructing multidimensional differential addition chains and their applications A Hutchinson, K Karabina Journal of Cryptographic Engineering 9, 1-19, 2019 | 11 | 2019 |
(short paper) analysis of a strong fault attack on static/ephemeral CSIDH JT LeGrow, A Hutchinson International Workshop on Security, 216-226, 2021 | 7 | 2021 |
d-MUL: Optimizing and Implementing a Multidimensional Scalar Multiplication Algorithm over Elliptic Curves H Hisil, A Hutchinson, K Karabina Security, Privacy, and Applied Cryptography Engineering: 8th International …, 2018 | 7 | 2018 |
Memory optimization techniques for computing discrete logarithms in compressed SIKE A Hutchinson, K Karabina, G Pereira Post-Quantum Cryptography: 12th International Workshop, PQCrypto 2021 …, 2021 | 6 | 2021 |
Supersingular Isogeny Key Encapsulation, October 1, 2020 D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ... | 6 | |
Supersingular Isogeny Key Encapsulation–submission to round 3 of NIST’s post-quantum cryptography standardization process, 2020 R Azarderakhsh, M Campagna, C Costello, LD Feo, B Hess, A Jalali, ... | 5 | |
An analysis of fault attacks on CSIDH J LeGrow, A Hutchinson Cryptology ePrint Archive, 2020 | 4 | 2020 |
Extending the Signed Non-zero Bit and Sign-Aligned Columns Methods to General Bases for Use in Cryptography A Dutta, A Hutchinson, K Karabina International Conference on Cryptology in India, 248-270, 2020 | 2 | 2020 |
Implementation aspects of supersingular isogeny-based cryptographic hash function MU Zaman, A Hutchinson, M Min International Wireless Internet Conference, 14-27, 2022 | 1 | 2022 |
A New Encoding Algorithm for a Multidimensional Version of the Montgomery Ladder A Hutchinson, K Karabina Progress in Cryptology-AFRICACRYPT 2020: 12th International Conference on …, 2020 | 1 | 2020 |
Supersingular Isogeny Diffie-Hellman with Legendre Form J Elliott, A Hutchinson Cryptology ePrint Archive, 2022 | | 2022 |
Algorithms in Elliptic Curve Cryptography A Hutchinson Florida Atlantic University, 2018 | | 2018 |
Optimizations of the CSIDH Key Exchange Protocol A Hutchinson 2021 Joint Mathematics Meetings (JMM), 0 | | |