Show
Sort by
-
- Journal Article
- A1
- open access
An infinite class of Neumaier graphs and non-existence results
-
Multiradical isogenies
-
- Journal Article
- A1
- open access
Breaking the decisional Diffie–Hellman problem for class group actions using genus theory : extended version
-
- Journal Article
- A2
- open access
On the decisional Diffie–Hellman problem for class group actions on oriented elliptic curves
-
A fusion algorithm for solving the hidden shift problem in finite abelian groups
(2021) POST-QUANTUM CRYPTOGRAPHY PQCRYPTO 2021. In Lecture Notes in Computer Science 12841. p.133-153 -
- Conference Paper
- C1
- open access
CSIDH on the surface
-
Lifting low-gonal curves for use in Tuitman’s algorithm
-
- Conference Paper
- C1
- open access
Rational isogenies from irrational endomorphisms
(2020) Advances in Cryptology – EUROCRYPT 2020. In Lecture Notes in Computer Science 12106. p.523-548 -
- Journal Article
- A2
- open access
Hash functions from superspecial genus-2 curves using Richelot isogenies
-
- Conference Paper
- C1
- open access
On the security of the multivariate ring learning with errors problem
-
- Conference Paper
- C1
- open access
Breaking the decisional Diffie-Hellman problem for class group actions using genus theory
-
Radical isogenies
-
- Journal Article
- A1
- open access
The dimension growth conjecture, polynomial in the degree and without logarithmic factors
-
- Journal Article
- A2
- open access
A framework for cryptographic problems from linear algebra
-
- Journal Article
- A2
- open access
Efficiently processing complex-valued data in homomorphic encryption
-
Canonical syzygies of smooth curves on toric surfaces
-
New bounds for exponential sums with a non-degenerate phase polynomial
-
Computing graded Betti tables of toric surfaces
-
Point counting on curves using a gonality preserving lift
-
Homomorphic SIM2D operations : single instruction much more data
(2018) ADVANCES IN CRYPTOLOGY : EUROCRYPT 2018, PT I. In Lecture Notes in Computer Science 10820. p.338-359 -
Translating between the roots of the identity in quantum computers
-
- Conference Paper
- C1
- open access
CSIDH : an efficient post-quantum commutative group action
(2018) Advances in cryptology, ASIACRYPT 2018 : proceedings. In Lecture Notes in Computer Science 11274. p.395-427 -
A lower bound for the gonality conjecture
-
Intrinsicness of the Newton polygon for smooth curves on ℙ¹ x ℙ¹
-
- Journal Article
- A1
- open access
Linear pencils encoded in the Newton polygon
-
Privacy-friendly forecasting for the smart grid using homomorphic encryption and the group method of data handling
-
Faster homomorphic function evaluation using non-integral base encoding
-
Hypersurfaces in weighted projective spaces over finite fields with applications to coding theory
-
The holomorphy conjecture for nondegenerate surface singularities
-
- Conference Paper
- C1
- open access
Provably weak instances of ring-LWE revisited
-
- Journal Article
- A1
- open access
On error distributions in ring-based LWE
-
- Journal Article
- A1
- open access
A minimal set of generators for the canonical ideal of a nondegenerate curve
-
The lattice size of a lattice polygon
-
- Journal Article
- A1
- open access
A combinatorial interpretation for Schreyer's tetragonal invariants
-
Curves in characteristic 2 with non-trivial 2-torsion
-
Constraints on counterexamples to the Casas-Alvero conjecture and a verification in degree 12
-
New equidistribution estimates of Zhang type