BibTeX records: Steven D. Galbraith

download as .bib file

@article{DBLP:journals/iacr/GalbraithLM24,
  author       = {Steven D. Galbraith and
                  Yi{-}Fu Lai and
                  Hart Montgomery},
  title        = {A Simpler and More Efficient Reduction of DLog to {CDH} for Abelian
                  Group Actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {191},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/191},
  timestamp    = {Fri, 16 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithGRS23,
  author       = {Steven D. Galbraith and
                  Rosario Gennaro and
                  Carla R{\`{a}}fols and
                  Ron Steinfeld},
  title        = {Guest editorial: Special issue on Mathematics of Zero-Knowledge},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3331--3332},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01260-2},
  doi          = {10.1007/S10623-023-01260-2},
  timestamp    = {Fri, 03 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BeullensFGP23,
  author       = {Ward Beullens and
                  Luca De Feo and
                  Steven D. Galbraith and
                  Christophe Petit},
  title        = {Proving knowledge of isogenies: a survey},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {11},
  pages        = {3425--3456},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01243-3},
  doi          = {10.1007/S10623-023-01243-3},
  timestamp    = {Fri, 10 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/BeullensFGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cpss/BanerjeeGKCR23,
  author       = {Shalini Banerjee and
                  Steven D. Galbraith and
                  Tariq Khan and
                  John Henry Castellanos and
                  Giovanni Russello},
  editor       = {Rodrigo Roman and
                  Mujeeb Ahmed},
  title        = {Preventing Reverse Engineering of Control Programs in Industrial Control
                  Systems},
  booktitle    = {Proceedings of the 9th {ACM} Cyber-Physical System Security Workshop,
                  {CPSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023},
  pages        = {48--59},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3592538.3594275},
  doi          = {10.1145/3592538.3594275},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cpss/BanerjeeGKCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/BanerjeeGR23,
  author       = {Shalini Banerjee and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Anupam Chattopadhyay and
                  Shivam Bhasin and
                  Stjepan Picek and
                  Chester Rebeiro},
  title        = {Obfuscating Evasive Decision Trees},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference
                  on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14460},
  pages        = {84--104},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-56235-8\_5},
  doi          = {10.1007/978-3-031-56235-8\_5},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/BanerjeeGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanerjeeGR23,
  author       = {Shalini Banerjee and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {Obfuscating Decision Trees},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {68},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/068},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BanerjeeGR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeullensFGP23,
  author       = {Ward Beullens and
                  Luca De Feo and
                  Steven D. Galbraith and
                  Christophe Petit},
  title        = {Proving knowledge of isogenies - {A} survey},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {671},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/671},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeullensFGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanerjeeG23,
  author       = {Shalini Banerjee and
                  Steven D. Galbraith},
  title        = {Auditable Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1476},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1476},
  timestamp    = {Sat, 07 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanerjeeG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPV23,
  author       = {Steven D. Galbraith and
                  Derek Perrin and
                  Jos{\'{e}} Felipe Voloch},
  title        = {{CSIDH} with Level Structure},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1726},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1726},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FeoDGZ22,
  author       = {Luca De Feo and
                  Samuel Dobson and
                  Steven D. Galbraith and
                  Lukas Zobernig},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {{SIDH} Proof of Knowledge},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {310--339},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_11},
  doi          = {10.1007/978-3-031-22966-4\_11},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FeoDGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/GalbraithL22,
  author       = {Steven D. Galbraith and
                  Yi{-}Fu Lai},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Attack on SHealS and HealS: The Second Wave of {GPST}},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {399--421},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_19},
  doi          = {10.1007/978-3-031-17234-2\_19},
  timestamp    = {Sun, 12 Nov 2023 02:15:49 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/GalbraithL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/DobsonG22,
  author       = {Samuel Dobson and
                  Steven D. Galbraith},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {Post-Quantum Signal Key Agreement from {SIDH}},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {422--450},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_20},
  doi          = {10.1007/978-3-031-17234-2\_20},
  timestamp    = {Tue, 18 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/DobsonG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ctrsa/2022,
  editor       = {Steven D. Galbraith},
  title        = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the
                  {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13161},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-030-95312-6},
  doi          = {10.1007/978-3-030-95312-6},
  isbn         = {978-3-030-95311-9},
  timestamp    = {Thu, 03 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2205-00135,
  author       = {Jeremy Booher and
                  Ross Bowden and
                  Javad Doliskani and
                  Tako Boris Fouotsa and
                  Steven D. Galbraith and
                  Sabrina Kunzweiler and
                  Simon{-}Philipp Merz and
                  Christophe Petit and
                  Benjamin Smith and
                  Katherine E. Stange and
                  Yan Bo Ti and
                  Christelle Vincent and
                  Jos{\'{e}} Felipe Voloch and
                  Charlotte Weitk{\"{a}}mper and
                  Lukas Zobernig},
  title        = {Failing to hash into supersingular isogeny graphs},
  journal      = {CoRR},
  volume       = {abs/2205.00135},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2205.00135},
  doi          = {10.48550/ARXIV.2205.00135},
  eprinttype    = {arXiv},
  eprint       = {2205.00135},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2205-00135.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2211-16128,
  author       = {Samuel Dobson and
                  Steven D. Galbraith and
                  Benjamin Smith},
  title        = {Trustless unknown-order groups},
  journal      = {CoRR},
  volume       = {abs/2211.16128},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2211.16128},
  doi          = {10.48550/ARXIV.2211.16128},
  eprinttype    = {arXiv},
  eprint       = {2211.16128},
  timestamp    = {Sun, 04 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2211-16128.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithL22,
  author       = {Steven D. Galbraith and
                  Yi{-}Fu Lai},
  title        = {Attack on SHealS and HealS: the Second Wave of {GPST}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {443},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/443},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BooherBDFGKMPSS22,
  author       = {Jeremy Booher and
                  Ross Bowden and
                  Javad Doliskani and
                  Tako Boris Fouotsa and
                  Steven D. Galbraith and
                  Sabrina Kunzweiler and
                  Simon{-}Philipp Merz and
                  Christophe Petit and
                  Benjamin Smith and
                  Katherine E. Stange and
                  Yan Bo Ti and
                  Christelle Vincent and
                  Jos{\'{e}} Felipe Voloch and
                  Charlotte Weitk{\"{a}}mper and
                  Lukas Zobernig},
  title        = {Failing to hash into supersingular isogeny graphs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {518},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/518},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BooherBDFGKMPSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithL22a,
  author       = {Steven D. Galbraith and
                  Trey Li},
  title        = {Obfuscation of Evasive Algebraic Set Membership},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1516},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1516},
  timestamp    = {Wed, 23 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithL22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/DobsonGLTZ21,
  author       = {Samuel Dobson and
                  Steven D. Galbraith and
                  Jason T. LeGrow and
                  Yan Bo Ti and
                  Lukas Zobernig},
  title        = {An adaptive attack on 2-SIDH},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {6},
  number       = {4},
  pages        = {387--404},
  year         = {2021},
  url          = {https://doi.org/10.1080/23799927.2021.2018115},
  doi          = {10.1080/23799927.2021.2018115},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/DobsonGLTZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CuiSAGR21,
  author       = {Shujie Cui and
                  Xiangfu Song and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable
                  Leakage},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {24},
  number       = {3},
  pages        = {18:1--18:35},
  year         = {2021},
  url          = {https://doi.org/10.1145/3446920},
  doi          = {10.1145/3446920},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tissec/CuiSAGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithL21,
  author       = {Steven D. Galbraith and
                  Trey Li},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Small Superset and Big Subset Obfuscation},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_4},
  doi          = {10.1007/978-3-030-90567-5\_4},
  timestamp    = {Mon, 08 Nov 2021 16:43:35 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LaiGG21,
  author       = {Yi{-}Fu Lai and
                  Steven D. Galbraith and
                  Cyprien Delpech de Saint Guilhem},
  editor       = {Anne Canteaut and
                  Fran{\c{c}}ois{-}Xavier Standaert},
  title        = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12696},
  pages        = {213--241},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-77870-5\_8},
  doi          = {10.1007/978-3-030-77870-5\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LaiGG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoDGZ21,
  author       = {Luca De Feo and
                  Samuel Dobson and
                  Steven D. Galbraith and
                  Lukas Zobernig},
  title        = {{SIDH} Proof of Knowledge},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1023},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1023},
  timestamp    = {Mon, 06 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoDGZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobsonG21,
  author       = {Samuel Dobson and
                  Steven D. Galbraith},
  title        = {Post-Quantum Signal Key Agreement with {SIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1187},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1187},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobsonG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20,
  author       = {Raphael C.{-}W. Phan and
                  Masayuki Abe and
                  Lynn Batten and
                  Jung Hee Cheon and
                  Ed Dawson and
                  Steven D. Galbraith and
                  Jian Guo and
                  Lucas C. K. Hui and
                  Kwangjo Kim and
                  Xuejia Lai and
                  Dong Hoon Lee and
                  Mitsuru Matsui and
                  Tsutomu Matsumoto and
                  Shiho Moriai and
                  Phong Q. Nguyen and
                  Dingyi Pei and
                  Duong Hieu Phan and
                  Josef Pieprzyk and
                  Huaxiong Wang and
                  Hank Wolfe and
                  Duncan S. Wong and
                  Tzong{-}Chen Wu and
                  Bo{-}Yin Yang and
                  Siu{-}Ming Yiu and
                  Yu Yu and
                  Jianying Zhou},
  title        = {Advances in security research in the Asiacrypt region},
  journal      = {Commun. {ACM}},
  volume       = {63},
  number       = {4},
  pages        = {76--81},
  year         = {2020},
  url          = {https://doi.org/10.1145/3378428},
  doi          = {10.1145/3378428},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcmcst/DobsonGLTZ20,
  author       = {Samuel Dobson and
                  Steven D. Galbraith and
                  Jason T. LeGrow and
                  Yan Bo Ti and
                  Lukas Zobernig},
  title        = {An adaptive attack on 2-SIDH},
  journal      = {Int. J. Comput. Math. Comput. Syst. Theory},
  volume       = {5},
  number       = {4},
  pages        = {282--299},
  year         = {2020},
  url          = {https://doi.org/10.1080/23799927.2020.1822446},
  doi          = {10.1080/23799927.2020.1822446},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcmcst/DobsonGLTZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GalbraithPS20,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Javier Silva},
  title        = {Identification Protocols and Signature Schemes Based on Supersingular
                  Isogeny Problems},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {1},
  pages        = {130--175},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09316-0},
  doi          = {10.1007/S00145-019-09316-0},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/GalbraithPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/DucasGPY20,
  author       = {L{\'{e}}o Ducas and
                  Steven D. Galbraith and
                  Thomas Prest and
                  Yang Yu},
  editor       = {Anne Canteaut and
                  Yuval Ishai},
  title        = {Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12106},
  pages        = {608--637},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-45724-2\_21},
  doi          = {10.1007/978-3-030-45724-2\_21},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/DucasGPY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GalbraithZ20,
  author       = {Steven D. Galbraith and
                  Lukas Zobernig},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {Obfuscating Finite Automata},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {90--114},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_4},
  doi          = {10.1007/978-3-030-81652-0\_4},
  timestamp    = {Thu, 29 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GalbraithZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/GalbraithGMP20,
  author       = {Steven D. Galbraith and
                  Robert Granger and
                  Simon{-}Philipp Merz and
                  Christophe Petit},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {On Index Calculus Algorithms for Subfield Curves},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {115--138},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_5},
  doi          = {10.1007/978-3-030-81652-0\_5},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/GalbraithGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/AsgharGLRZ20,
  author       = {Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Andrea Lanzi and
                  Giovanni Russello and
                  Lukas Zobernig},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {Towards a Theory of Special-Purpose Program Obfuscation},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {394--401},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00061},
  doi          = {10.1109/TRUSTCOM50675.2020.00061},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/AsgharGLRZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2011-02607,
  author       = {Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Andrea Lanzi and
                  Giovanni Russello and
                  Lukas Zobernig},
  title        = {Towards a Theory of Special-purpose Program Obfuscation},
  journal      = {CoRR},
  volume       = {abs/2011.02607},
  year         = {2020},
  url          = {https://arxiv.org/abs/2011.02607},
  eprinttype    = {arXiv},
  eprint       = {2011.02607},
  timestamp    = {Mon, 09 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2011-02607.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobsonG20,
  author       = {Samuel Dobson and
                  Steven D. Galbraith},
  title        = {Trustless Groups of Unknown Order with Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {196},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/196},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobsonG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithZ20,
  author       = {Steven D. Galbraith and
                  Lukas Zobernig},
  title        = {Obfuscating Finite Automata},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1009},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LaiGG20,
  author       = {Yi{-}Fu Lai and
                  Steven D. Galbraith and
                  Cyprien Delpech de Saint Guilhem},
  title        = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1012},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LaiGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithL20,
  author       = {Steven D. Galbraith and
                  Trey Li},
  title        = {Big Subset and Small Superset Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1018},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1018},
  timestamp    = {Wed, 02 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithGMP20,
  author       = {Steven D. Galbraith and
                  Robert Granger and
                  Simon{-}Philipp Merz and
                  Christophe Petit},
  title        = {On Index Calculus Algorithms for Subfield Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1315},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1315},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithGMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/BaiGLS19,
  author       = {Shi Bai and
                  Steven D. Galbraith and
                  Liangze Li and
                  Daniel Sheffield},
  title        = {Improved Combinatorial Algorithms for the Inhomogeneous Short Integer
                  Solution Problem},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {1},
  pages        = {35--83},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9304-1},
  doi          = {10.1007/S00145-018-9304-1},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/BaiGLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/FeoG19,
  author       = {Luca De Feo and
                  Steven D. Galbraith},
  editor       = {Yuval Ishai and
                  Vincent Rijmen},
  title        = {SeaSign: Compact Isogeny Signatures from Class Group Actions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11478},
  pages        = {759--789},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17659-4\_26},
  doi          = {10.1007/978-3-030-17659-4\_26},
  timestamp    = {Fri, 31 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/FeoG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithMP19,
  author       = {Steven D. Galbraith and
                  Jake Massimo and
                  Kenneth G. Paterson},
  editor       = {Dongdai Lin and
                  Kazue Sako},
  title        = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter
                  Validation},
  booktitle    = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Beijing, China,
                  April 14-17, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11443},
  pages        = {379--407},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-17259-6\_13},
  doi          = {10.1007/978-3-030-17259-6\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/GalbraithZ19,
  author       = {Steven D. Galbraith and
                  Lukas Zobernig},
  editor       = {Dennis Hofheinz and
                  Alon Rosen},
  title        = {Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product
                  Problems},
  booktitle    = {Theory of Cryptography - 17th International Conference, {TCC} 2019,
                  Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11891},
  pages        = {81--110},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36030-6\_4},
  doi          = {10.1007/978-3-030-36030-6\_4},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/tcc/GalbraithZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZobernigGR19,
  author       = {Lukas Zobernig and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {When are Opaque Predicates Useful?},
  booktitle    = {18th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 13th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua,
                  New Zealand, August 5-8, 2019},
  pages        = {168--175},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00031},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2019.00031},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZobernigGR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2019-1,
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5},
  doi          = {10.1007/978-3-030-34578-5},
  isbn         = {978-3-030-34577-8},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2019-2,
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11922},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34621-8},
  doi          = {10.1007/978-3-030-34621-8},
  isbn         = {978-3-030-34620-1},
  timestamp    = {Fri, 22 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2019-3,
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11923},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34618-8},
  doi          = {10.1007/978-3-030-34618-8},
  isbn         = {978-3-030-34617-1},
  timestamp    = {Fri, 22 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2019-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ccs/2019asia,
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705},
  doi          = {10.1145/3321705},
  isbn         = {978-1-4503-6752-3},
  timestamp    = {Tue, 10 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/2019asia.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1909-11624,
  author       = {Shujie Cui and
                  Xiangfu Song and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {Privacy-preserving Searchable Databases with Controllable Leakage},
  journal      = {CoRR},
  volume       = {abs/1909.11624},
  year         = {2019},
  url          = {http://arxiv.org/abs/1909.11624},
  eprinttype    = {arXiv},
  eprint       = {1909.11624},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1909-11624.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithMP19,
  author       = {Steven D. Galbraith and
                  Jake Massimo and
                  Kenneth G. Paterson},
  title        = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter
                  Validation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {32},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/032},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DucasGPY19,
  author       = {L{\'{e}}o Ducas and
                  Steven D. Galbraith and
                  Thomas Prest and
                  Yang Yu},
  title        = {Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {320},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/320},
  timestamp    = {Sun, 22 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/DucasGPY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithZ19,
  author       = {Steven D. Galbraith and
                  Lukas Zobernig},
  title        = {Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {620},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/620},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobsonGLTZ19,
  author       = {Samuel Dobson and
                  Steven D. Galbraith and
                  Jason T. LeGrow and
                  Yan Bo Ti and
                  Lukas Zobernig},
  title        = {Extending the Adaptive Attack to 2-SIDH},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {890},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/890},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobsonGLTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DobsonG19,
  author       = {Samuel Dobson and
                  Steven D. Galbraith},
  title        = {On the Degree-Insensitive {SI-GDH} problem and assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {929},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/929},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DobsonG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cjtcs/GalbraithLS18,
  author       = {Steven D. Galbraith and
                  Joel Laity and
                  Barak Shani},
  title        = {Finding Significant Fourier Coefficients: Clarifications, Simplifications,
                  Applications and Limitations},
  journal      = {Chic. J. Theor. Comput. Sci.},
  volume       = {2018},
  year         = {2018},
  url          = {http://cjtcs.cs.uchicago.edu/articles/2018/6/contents.html},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cjtcs/GalbraithLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qip/GalbraithV18,
  author       = {Steven D. Galbraith and
                  Frederik Vercauteren},
  title        = {Computational problems in supersingular elliptic curve isogenies},
  journal      = {Quantum Inf. Process.},
  volume       = {17},
  number       = {10},
  pages        = {265},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11128-018-2023-6},
  doi          = {10.1007/S11128-018-2023-6},
  timestamp    = {Thu, 16 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qip/GalbraithV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-1,
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2},
  doi          = {10.1007/978-3-030-03326-2},
  isbn         = {978-3-030-03325-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2018-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-2,
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11273},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03329-3},
  doi          = {10.1007/978-3-030-03329-3},
  isbn         = {978-3-030-03328-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2018-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2018-3,
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11274},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03332-3},
  doi          = {10.1007/978-3-030-03332-3},
  isbn         = {978-3-030-03331-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2018-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1812-09116,
  author       = {Steven D. Galbraith and
                  Lorenz Panny and
                  Benjamin Smith and
                  Frederik Vercauteren},
  title        = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions},
  journal      = {CoRR},
  volume       = {abs/1812.09116},
  year         = {2018},
  url          = {http://arxiv.org/abs/1812.09116},
  eprinttype    = {arXiv},
  eprint       = {1812.09116},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1812-09116.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith18,
  author       = {Steven D. Galbraith},
  title        = {Authenticated key exchange for {SIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {266},
  year         = {2018},
  url          = {http://eprint.iacr.org/2018/266},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FeoG18,
  author       = {Luca De Feo and
                  Steven D. Galbraith},
  title        = {SeaSign: Compact isogeny signatures from class group actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {824},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/824},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FeoG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPSV18,
  author       = {Steven D. Galbraith and
                  Lorenz Panny and
                  Benjamin Smith and
                  Frederik Vercauteren},
  title        = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1199},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1199},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPSV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/GalbraithWZ17,
  author       = {Steven D. Galbraith and
                  Ping Wang and
                  Fangguo Zhang},
  title        = {Computing elliptic curve discrete logarithms with improved baby-step
                  giant-step algorithm},
  journal      = {Adv. Math. Commun.},
  volume       = {11},
  number       = {3},
  pages        = {453--469},
  year         = {2017},
  url          = {https://doi.org/10.3934/amc.2017038},
  doi          = {10.3934/AMC.2017038},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/GalbraithWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcloud/CuiAGR17,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Geoffrey C. Fox},
  title        = {P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases},
  booktitle    = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD),
                  Honolulu, HI, USA, June 25-30, 2017},
  pages        = {334--341},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/CLOUD.2017.50},
  doi          = {10.1109/CLOUD.2017.50},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcloud/CuiAGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiAGR17,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Secure and Practical Searchable Encryption: {A} Position Paper},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {266--281},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_14},
  doi          = {10.1007/978-3-319-60055-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GalbraithPS17,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Javier Silva},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Identification Protocols and Signature Schemes Based on Supersingular
                  Isogeny Problems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  pages        = {3--33},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8\_1},
  doi          = {10.1007/978-3-319-70694-8\_1},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GalbraithPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fps/CuiAGR17,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Abdessamad Imine and
                  Jos{\'{e}} M. Fernandez and
                  Jean{-}Yves Marion and
                  Luigi Logrippo and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {ObliviousDB: Practical and Efficient Searchable Encryption with Controllable
                  Leakage},
  booktitle    = {Foundations and Practice of Security - 10th International Symposium,
                  {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10723},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-75650-9\_13},
  doi          = {10.1007/978-3-319-75650-9\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fps/CuiAGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithV17,
  author       = {Steven D. Galbraith and
                  Frederik Vercauteren},
  title        = {Computational problems in supersingular elliptic curve isogenies},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {774},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/774},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithV17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ZobernigGR17,
  author       = {Lukas Zobernig and
                  Steven D. Galbraith and
                  Giovanni Russello},
  title        = {Indistinguishable Predicates: {A} New Tool for Obfuscation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {787},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/787},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ZobernigGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithG16,
  author       = {Steven D. Galbraith and
                  Pierrick Gaudry},
  title        = {Recent progress on the elliptic curve discrete logarithm problem},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {1},
  pages        = {51--72},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-015-0146-7},
  doi          = {10.1007/S10623-015-0146-7},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/DelfsG16,
  author       = {Christina Delfs and
                  Steven D. Galbraith},
  title        = {Computing isogenies between supersingular elliptic curves over {\(\mathbb{F}\)}\({}_{\mbox{p}}\)},
  journal      = {Des. Codes Cryptogr.},
  volume       = {78},
  number       = {2},
  pages        = {425--440},
  year         = {2016},
  url          = {https://doi.org/10.1007/s10623-014-0010-1},
  doi          = {10.1007/S10623-014-0010-1},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/DelfsG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/GalbraithGM16,
  author       = {Steven D. Galbraith and
                  Shishay W. Gebregiyorgis and
                  Sean Murphy},
  title        = {Algorithms for the approximate common divisor problem},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {19},
  number       = {A},
  pages        = {58--72},
  year         = {2016},
  url          = {https://doi.org/10.1112/s1461157016000218},
  doi          = {10.1112/S1461157016000218},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/GalbraithGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/GalbraithPST16,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Barak Shani and
                  Yan Bo Ti},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {On the Security of Supersingular Isogeny Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {63--91},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_3},
  doi          = {10.1007/978-3-662-53887-6\_3},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/GalbraithPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiGM16,
  author       = {Zengpeng Li and
                  Steven D. Galbraith and
                  Chunguang Ma},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Preventing Adaptive Key Recovery Attacks on the {GSW} Levelled Homomorphic
                  Encryption Scheme},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {373--383},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_22},
  doi          = {10.1007/978-3-319-47422-9\_22},
  timestamp    = {Wed, 14 Jul 2021 15:56:25 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/GalbraithLS16,
  author       = {Steven D. Galbraith and
                  Joel Laity and
                  Barak Shani},
  title        = {Finding Significant Fourier Coefficients: Clarifications, Simplifications,
                  Applications and Limitations},
  journal      = {CoRR},
  volume       = {abs/1607.01842},
  year         = {2016},
  url          = {http://arxiv.org/abs/1607.01842},
  eprinttype    = {arXiv},
  eprint       = {1607.01842},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/GalbraithLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithGM16,
  author       = {Steven D. Galbraith and
                  Shishay W. Gebregiyorgis and
                  Sean Murphy},
  title        = {Algorithms for the Approximate Common Divisor Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {215},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/215},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLS16,
  author       = {Steven D. Galbraith and
                  Joel Laity and
                  Barak Shani},
  title        = {Finding Significant Fourier Coefficients: Clarifications, Simplifications,
                  Applications and Limitations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {682},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/682},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPST16,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Barak Shani and
                  Yan Bo Ti},
  title        = {On the Security of Supersingular Isogeny Cryptosystems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {859},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/859},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiGM16,
  author       = {Zengpeng Li and
                  Steven D. Galbraith and
                  Chunguang Ma},
  title        = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters
                  Leveled Homomorphic Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1146},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS16,
  author       = {Steven D. Galbraith and
                  Christophe Petit and
                  Javier Silva},
  title        = {Signature Schemes Based On Supersingular Isogeny Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1154},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1154},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/GalbraithS15,
  author       = {Steven D. Galbraith and
                  Barak Shani},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {The Multivariate Hidden Number Problem},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {250--268},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_15},
  doi          = {10.1007/978-3-319-17470-9\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/GalbraithS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/DahabGM15,
  author       = {Ricardo Dahab and
                  Steven D. Galbraith and
                  Eduardo Morais},
  editor       = {Anja Lehmann and
                  Stefan Wolf},
  title        = {Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption
                  Schemes},
  booktitle    = {Information Theoretic Security - 8th International Conference, {ICITS}
                  2015, Lugano, Switzerland, May 2-5, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9063},
  pages        = {283--296},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-17470-9\_17},
  doi          = {10.1007/978-3-319-17470-9\_17},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/DahabGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/FowlerG15,
  author       = {Alex Fowler and
                  Steven D. Galbraith},
  title        = {Kangaroo Methods for Solving the Interval Discrete Logarithm Problem},
  journal      = {CoRR},
  volume       = {abs/1501.07019},
  year         = {2015},
  url          = {http://arxiv.org/abs/1501.07019},
  eprinttype    = {arXiv},
  eprint       = {1501.07019},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/FowlerG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS15,
  author       = {Steven D. Galbraith and
                  Barak Shani},
  title        = {The Multivariate Hidden Number Problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DahabGM15,
  author       = {Ricardo Dahab and
                  Steven D. Galbraith and
                  Eduardo Morais},
  title        = {Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption
                  schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {127},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DahabGM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithWZ15,
  author       = {Steven D. Galbraith and
                  Ping Wang and
                  Fangguo Zhang},
  title        = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step
                  Giant-step Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {605},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/605},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithG15,
  author       = {Steven D. Galbraith and
                  Pierrick Gaudry},
  title        = {Recent progress on the elliptic curve discrete logarithm problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1022},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/DwarakanathG14,
  author       = {Nagarjun C. Dwarakanath and
                  Steven D. Galbraith},
  title        = {Sampling from discrete Gaussians for lattice-based cryptography on
                  a constrained device},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {25},
  number       = {3},
  pages        = {159--180},
  year         = {2014},
  url          = {https://doi.org/10.1007/s00200-014-0218-3},
  doi          = {10.1007/S00200-014-0218-3},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/aaecc/DwarakanathG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithZ14,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Erratum Self-pairings on hyperelliptic curves {[J.} Math. Cryptol.
                  7(2013), 31-42]},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {1},
  pages        = {93},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-5010},
  doi          = {10.1515/JMC-2013-5010},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/ChevyrevG14,
  author       = {Ilya Chevyrev and
                  Steven D. Galbraith},
  title        = {Constructing supersingular elliptic curves with a given endomorphism
                  ring},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {17},
  number       = {Theory},
  pages        = {71--91},
  year         = {2014},
  url          = {https://doi.org/10.1112/s1461157014000254},
  doi          = {10.1112/S1461157014000254},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/ChevyrevG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiG14,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Lattice Decoding Attacks on Binary {LWE}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {322--337},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_21},
  doi          = {10.1007/978-3-319-08344-5\_21},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BaiG14,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  editor       = {Josh Benaloh},
  title        = {An Improved Compression Technique for Signatures Based on Learning
                  with Errors},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at
                  the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8366},
  pages        = {28--47},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-04852-9\_2},
  doi          = {10.1007/978-3-319-04852-9\_2},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BaiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GalbraithG14,
  author       = {Steven D. Galbraith and
                  Shishay W. Gebregiyorgis},
  editor       = {Willi Meier and
                  Debdeep Mukhopadhyay},
  title        = {Summation Polynomial Algorithms for Elliptic Curves in Characteristic
                  Two},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference
                  on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8885},
  pages        = {409--427},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13039-2\_24},
  doi          = {10.1007/978-3-319-13039-2\_24},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GalbraithG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiGLS14,
  author       = {Shi Bai and
                  Steven D. Galbraith and
                  Liangze Li and
                  Daniel Sheffield},
  title        = {Improved Exponential-time Algorithms for Inhomogeneous-SIS},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {593},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/593},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiGLS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithG14,
  author       = {Steven D. Galbraith and
                  Shishay W. Gebregiyorgis},
  title        = {Summation polynomial algorithms for elliptic curves in characteristic
                  two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {806},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/806},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/GalbraithS13,
  author       = {Steven D. Galbraith and
                  Anton Stolbunov},
  title        = {Improved algorithm for the isogeny problem for ordinary elliptic curves},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {24},
  number       = {2},
  pages        = {107--131},
  year         = {2013},
  url          = {https://doi.org/10.1007/s00200-013-0185-0},
  doi          = {10.1007/S00200-013-0185-0},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/GalbraithS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithZ13,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Self-pairings on hyperelliptic curves},
  journal      = {J. Math. Cryptol.},
  volume       = {7},
  number       = {1},
  pages        = {31--42},
  year         = {2013},
  url          = {https://doi.org/10.1515/jmc-2012-0009},
  doi          = {10.1515/JMC-2012-0009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/GalbraithPR13,
  author       = {Steven D. Galbraith and
                  John M. Pollard and
                  Raminder S. Ruprai},
  title        = {Computing discrete logarithms in an interval},
  journal      = {Math. Comput.},
  volume       = {82},
  number       = {282},
  pages        = {1181--1195},
  year         = {2013},
  url          = {https://doi.org/10.1090/S0025-5718-2012-02641-X},
  doi          = {10.1090/S0025-5718-2012-02641-X},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/GalbraithPR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiG13,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  title        = {An improved compression technique for signatures based on learning
                  with errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/838},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaiG13a,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  title        = {Lattice Decoding Attacks on Binary {LWE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {839},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/839},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BaiG13a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/cu/Galbraith2012,
  author       = {Steven D. Galbraith},
  title        = {Mathematics of Public Key Cryptography},
  publisher    = {Cambridge University Press},
  year         = {2012},
  url          = {https://www.math.auckland.ac.nz/\%7Esgal018/crypto-book/crypto-book.html},
  isbn         = {9781107013926},
  timestamp    = {Fri, 12 Feb 2016 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/books/cu/Galbraith2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GalbraithH12,
  author       = {Steven D. Galbraith and
                  Mark Holmes},
  title        = {A non-uniform birthday problem with applications to discrete logarithms},
  journal      = {Discret. Appl. Math.},
  volume       = {160},
  number       = {10-11},
  pages        = {1547--1560},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.dam.2012.02.019},
  doi          = {10.1016/J.DAM.2012.02.019},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GalbraithH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/indocrypt/2012,
  editor       = {Steven D. Galbraith and
                  Mridul Nandi},
  title        = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference
                  on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7668},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34931-7},
  doi          = {10.1007/978-3-642-34931-7},
  isbn         = {978-3-642-34930-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithZ12,
  author       = {Steven D. Galbraith and
                  Chang{-}An Zhao},
  title        = {Self-pairings on Hyperelliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {267},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/267},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/EagleGO11,
  author       = {Philip N. J. Eagle and
                  Steven D. Galbraith and
                  John Ong},
  title        = {Point compression for Koblitz elliptic curves},
  journal      = {Adv. Math. Commun.},
  volume       = {5},
  number       = {1},
  pages        = {1--10},
  year         = {2011},
  url          = {https://doi.org/10.3934/amc.2011.5.1},
  doi          = {10.3934/AMC.2011.5.1},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/EagleGO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AvanziJGM11,
  author       = {Roberto Avanzi and
                  Waldyr D. Benits Junior and
                  Steven D. Galbraith and
                  James F. McKee},
  title        = {On the distribution of the coefficients of normal forms for Frobenius
                  expansions},
  journal      = {Des. Codes Cryptogr.},
  volume       = {61},
  number       = {1},
  pages        = {71--89},
  year         = {2011},
  url          = {https://doi.org/10.1007/s10623-010-9439-z},
  doi          = {10.1007/S10623-010-9439-Z},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AvanziJGM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/GalbraithLS11,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  Michael Scott},
  title        = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class
                  of Curves},
  journal      = {J. Cryptol.},
  volume       = {24},
  number       = {3},
  pages        = {446--469},
  year         = {2011},
  url          = {https://doi.org/10.1007/s00145-010-9065-y},
  doi          = {10.1007/S00145-010-9065-Y},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/GalbraithLS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1105-6331,
  author       = {Steven D. Galbraith and
                  Anton Stolbunov},
  title        = {Improved Algorithm for the Isogeny Problem for Ordinary Elliptic Curves},
  journal      = {CoRR},
  volume       = {abs/1105.6331},
  year         = {2011},
  url          = {http://arxiv.org/abs/1105.6331},
  eprinttype    = {arXiv},
  eprint       = {1105.6331},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1105-6331.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithR10,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm
                  Problem in a Short Interval},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {368--383},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_22},
  doi          = {10.1007/978-3-642-13013-7\_22},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithR10,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  title        = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm
                  Problem in a Short Interval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {615},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/615},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithH10,
  author       = {Steven D. Galbraith and
                  Mark Holmes},
  title        = {A non-uniform birthday problem with applications to discrete logarithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {616},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/616},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPR10,
  author       = {Steven D. Galbraith and
                  John M. Pollard and
                  Raminder S. Ruprai},
  title        = {Computing Discrete Logarithms in an Interval},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {617},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/617},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/GalbraithL09,
  author       = {Steven D. Galbraith and
                  Xibin Lin},
  title        = {Computing pairings using \emph{x} -coordinates only},
  journal      = {Des. Codes Cryptogr.},
  volume       = {50},
  number       = {3},
  pages        = {305--324},
  year         = {2009},
  url          = {https://doi.org/10.1007/s10623-008-9233-3},
  doi          = {10.1007/S10623-008-9233-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/GalbraithL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithPRS09,
  author       = {Steven D. Galbraith and
                  Jordi Pujol{\`{a}}s and
                  Christophe Ritzenthaler and
                  Benjamin A. Smith},
  title        = {Distortion maps for supersingular genus two curves},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {1},
  pages        = {1--18},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.001},
  doi          = {10.1515/JMC.2009.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithPRS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GalbraithLS09,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  Michael Scott},
  editor       = {Antoine Joux},
  title        = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class
                  of Curves},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {518--535},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_30},
  doi          = {10.1007/978-3-642-01001-9\_30},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GalbraithLS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalbraithR09,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  editor       = {Matthew Geoffrey Parker},
  title        = {An Improvement to the Gaudry-Schost Algorithm for Multidimensional
                  Discrete Logarithm Problems},
  booktitle    = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography
                  and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5921},
  pages        = {368--382},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10868-6\_22},
  doi          = {10.1007/978-3-642-10868-6\_22},
  timestamp    = {Wed, 01 Sep 2021 10:36:08 +0200},
  biburl       = {https://dblp.org/rec/conf/ima/GalbraithR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EagleGO09,
  author       = {Philip N. J. Eagle and
                  Steven D. Galbraith and
                  John Ong},
  title        = {Point Compression for Koblitz Elliptic Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {86},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/086},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EagleGO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/GalbraithR08,
  author       = {Steven D. Galbraith and
                  Raminder S. Ruprai},
  title        = {Computing L-polynomials of non-hyperelliptic genus 4 and 5 curves
                  (abstract only)},
  journal      = {{ACM} Commun. Comput. Algebra},
  volume       = {42},
  number       = {1-2},
  pages        = {56--57},
  year         = {2008},
  url          = {https://doi.org/10.1145/1394042.1394069},
  doi          = {10.1145/1394042.1394069},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cca/GalbraithR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/GalbraithPS08,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for cryptographers},
  journal      = {Discret. Appl. Math.},
  volume       = {156},
  number       = {16},
  pages        = {3113--3121},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.dam.2007.12.010},
  doi          = {10.1016/J.DAM.2007.12.010},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/GalbraithHV08,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Frederik Vercauteren},
  title        = {Aspects of Pairing Inversion},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {54},
  number       = {12},
  pages        = {5719--5728},
  year         = {2008},
  url          = {https://doi.org/10.1109/TIT.2008.2006431},
  doi          = {10.1109/TIT.2008.2006431},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/GalbraithHV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/GalbraithHM08,
  author       = {Steven D. Galbraith and
                  Michael Harrison and
                  David J. Mireles Morales},
  editor       = {Alfred J. van der Poorten and
                  Andreas Stein},
  title        = {Efficient Hyperelliptic Arithmetic Using Balanced Representation for
                  Divisors},
  booktitle    = {Algorithmic Number Theory, 8th International Symposium, ANTS-VIII,
                  Banff, Canada, May 17-22, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5011},
  pages        = {342--356},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79456-1\_23},
  doi          = {10.1007/978-3-540-79456-1\_23},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/GalbraithHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/GalbraithS08,
  author       = {Steven D. Galbraith and
                  Michael Scott},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Exponentiation in Pairing-Friendly Groups Using Homomorphisms},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {211--224},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_15},
  doi          = {10.1007/978-3-540-85538-5\_15},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/GalbraithS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/GalbraithLM08,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  David J. Mireles Morales},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Pairings on Hyperelliptic Curves with a Real Model},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {265--281},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_18},
  doi          = {10.1007/978-3-540-85538-5\_18},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/GalbraithLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/GalbraithV08,
  author       = {Steven D. Galbraith and
                  Eric R. Verheul},
  editor       = {Ronald Cramer},
  title        = {An Analysis of the Vector Decomposition Problem},
  booktitle    = {Public Key Cryptography - {PKC} 2008, 11th International Workshop
                  on Practice and Theory in Public-Key Cryptography, Barcelona, Spain,
                  March 9-12, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4939},
  pages        = {308--327},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78440-1\_18},
  doi          = {10.1007/978-3-540-78440-1\_18},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/GalbraithV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2008,
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5},
  doi          = {10.1007/978-3-540-85538-5},
  isbn         = {978-3-540-85503-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithL08,
  author       = {Steven D. Galbraith and
                  Xibin Lin},
  title        = {Computing Pairings Using x-Coordinates Only},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {19},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/019},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS08,
  author       = {Steven D. Galbraith and
                  Michael Scott},
  title        = {Exponentiation in pairing-friendly groups using homomorphisms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {117},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/117},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLS08,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  Michael Scott},
  title        = {Endomorphisms for faster elliptic curve cryptography on a large class
                  of curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {194},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/194},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CastryckGF08,
  author       = {Wouter Castryck and
                  Steven D. Galbraith and
                  Reza Rezaeian Farashahi},
  title        = {Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery
                  representation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {218},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/218},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/CastryckGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithLM08,
  author       = {Steven D. Galbraith and
                  Xibin Lin and
                  David J. Mireles Morales},
  title        = {Pairings on hyperelliptic curves with a real model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {250},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/250},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithLM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHM08,
  author       = {Steven D. Galbraith and
                  Michael Harrison and
                  David J. Mireles Morales},
  title        = {Efficient Hyperelliptic Arithmetic using Balanced Representation for
                  Divisors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {265},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/265},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BarretoGOS07,
  author       = {Paulo S. L. M. Barreto and
                  Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Michael Scott},
  title        = {Efficient pairing computation on supersingular Abelian varieties},
  journal      = {Des. Codes Cryptogr.},
  volume       = {42},
  number       = {3},
  pages        = {239--271},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-006-9033-6},
  doi          = {10.1007/S10623-006-9033-6},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BarretoGOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/GalbraithMV07,
  author       = {Steven D. Galbraith and
                  James F. McKee and
                  P. C. Valen{\c{c}}a},
  title        = {Ordinary abelian varieties having small embedding degree},
  journal      = {Finite Fields Their Appl.},
  volume       = {13},
  number       = {4},
  pages        = {800--814},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.ffa.2007.02.003},
  doi          = {10.1016/J.FFA.2007.02.003},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/GalbraithMV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/GalbraithhS07,
  author       = {Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Caroline Sheedy},
  title        = {Simplified pairing computation and security implications},
  journal      = {J. Math. Cryptol.},
  volume       = {1},
  number       = {3},
  pages        = {267--281},
  year         = {2007},
  url          = {https://doi.org/10.1515/JMC.2007.013},
  doi          = {10.1515/JMC.2007.013},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/GalbraithhS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/JuniorG07,
  author       = {Waldyr D. Benits Junior and
                  Steven D. Galbraith},
  editor       = {Steven D. Galbraith},
  title        = {Constructing Pairing-Friendly Elliptic Curves Using Gr{\"{o}}bner
                  Basis Reduction},
  booktitle    = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  pages        = {336--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9\_20},
  doi          = {10.1007/978-3-540-77272-9\_20},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/JuniorG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/GalbraithHV07,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Frederik Vercauteren},
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Hyperelliptic Pairings},
  booktitle    = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  pages        = {108--131},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5\_7},
  doi          = {10.1007/978-3-540-73489-5\_7},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/GalbraithHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/weworc/JuniorG07,
  author       = {Waldyr D. Benits Junior and
                  Steven D. Galbraith},
  editor       = {Stefan Lucks and
                  Ahmad{-}Reza Sadeghi and
                  Christopher Wolf},
  title        = {The {GPS} Identification Scheme Using Frobenius Expansions},
  booktitle    = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007,
                  Bochum, Germany, July 4-6, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4945},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-88353-1\_2},
  doi          = {10.1007/978-3-540-88353-1\_2},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/weworc/JuniorG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ima/2007,
  editor       = {Steven D. Galbraith},
  title        = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester,
                  UK, December 18-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4887},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77272-9},
  doi          = {10.1007/978-3-540-77272-9},
  isbn         = {978-3-540-77271-2},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHV07,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Frederik Vercauteren},
  title        = {Aspects of Pairing Inversion},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {256},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/256},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/DentG06,
  author       = {Alexander W. Dent and
                  Steven D. Galbraith},
  editor       = {Florian Hess and
                  Sebastian Pauli and
                  Michael E. Pohst},
  title        = {Hidden Pairings and Trapdoor {DDH} Groups},
  booktitle    = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII,
                  Berlin, Germany, July 23-28, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4076},
  pages        = {436--451},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11792086\_31},
  doi          = {10.1007/11792086\_31},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/DentG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPS06,
  author       = {Steven D. Galbraith and
                  Kenneth G. Paterson and
                  Nigel P. Smart},
  title        = {Pairings for Cryptographers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {165},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/165},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithOS06,
  author       = {Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Caroline Sheedy},
  title        = {Simplified pairing computation and security implications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {169},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/169},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithOS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith06,
  author       = {Steven D. Galbraith},
  title        = {Disguising tori and elliptic curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithS06,
  author       = {Steven D. Galbraith and
                  Benjamin A. Smith},
  title        = {Discrete Logarithms in Generalized Jacobians},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {333},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/333},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithPRS06,
  author       = {Steven D. Galbraith and
                  Jordi Pujol{\`{a}}s and
                  Christophe Ritzenthaler and
                  Benjamin A. Smith},
  title        = {Distortion maps for genus two curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithPRS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/GalbraithM05,
  author       = {Steven D. Galbraith and
                  Alfred Menezes},
  title        = {Algebraic curves and cryptography},
  journal      = {Finite Fields Their Appl.},
  volume       = {11},
  number       = {3},
  pages        = {544--577},
  year         = {2005},
  url          = {https://doi.org/10.1016/j.ffa.2005.05.001},
  doi          = {10.1016/J.FFA.2005.05.001},
  timestamp    = {Fri, 12 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/GalbraithM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithHM05,
  author       = {Steven D. Galbraith and
                  Chris Heneghan and
                  James F. McKee},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Tunable Balancing of {RSA}},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_24},
  doi          = {10.1007/11506157\_24},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalbraithM05,
  author       = {Steven D. Galbraith and
                  James F. McKee},
  editor       = {Nigel P. Smart},
  title        = {Pairings on Elliptic Curves over Finite Commutative Rings},
  booktitle    = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester,
                  UK, December 19-21, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3796},
  pages        = {392--409},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11586821\_26},
  doi          = {10.1007/11586821\_26},
  timestamp    = {Wed, 18 Mar 2020 16:00:57 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GalbraithM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith05,
  author       = {Steven D. Galbraith},
  title        = {The Weil pairing on elliptic curves over {C}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {323},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/323},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/GalbraithR04,
  author       = {Steven D. Galbraith and
                  Victor Rotger},
  title        = {Easy Decision Diffie-Hellman Groups},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {7},
  pages        = {201--218},
  year         = {2004},
  url          = {https://doi.org/10.1112/s1461157000001108},
  doi          = {10.1112/S1461157000001108},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/GalbraithR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithHS04,
  author       = {Steven D. Galbraith and
                  Herbie J. Hopkins and
                  Igor E. Shparlinski},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Secure Bilinear Diffie-Hellman Bits},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {370--378},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_32},
  doi          = {10.1007/978-3-540-27800-9\_32},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithR04,
  author       = {Steven D. Galbraith and
                  Victor Rotger},
  title        = {Easy decision-Diffie-Hellman groups},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {70},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/070},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithMV04,
  author       = {Steven D. Galbraith and
                  James F. McKee and
                  P. C. Valen{\c{c}}a},
  title        = {Ordinary abelian varieties having small embedding degree},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {365},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/365},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithMV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BarretoGhS04,
  author       = {Paulo S. L. M. Barreto and
                  Steven D. Galbraith and
                  Colm O'hEigeartaigh and
                  Michael Scott},
  title        = {Efficient Pairing Computation on Supersingular Abelian Varieties},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {375},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/375},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BarretoGhS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/Galbraith03,
  author       = {Steven D. Galbraith},
  title        = {Weil Descent of Jacobians},
  journal      = {Discret. Appl. Math.},
  volume       = {128},
  number       = {1},
  pages        = {165--180},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0166-218X(02)00443-2},
  doi          = {10.1016/S0166-218X(02)00443-2},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dam/Galbraith03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GalbraithM03,
  author       = {Steven D. Galbraith and
                  Wenbo Mao},
  editor       = {Marc Joye},
  title        = {Invisibility and Anonymity of Undeniable and Confirmer Signatures},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_6},
  doi          = {10.1007/3-540-36563-X\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GalbraithM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BlackburnCG03,
  author       = {Simon R. Blackburn and
                  Carlos Cid and
                  Steven D. Galbraith},
  title        = {Cryptanalysis of a Cryptosystem based on Drinfeld modules},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {223},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/223},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BlackburnCG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/GalbraithMS02,
  author       = {Steven D. Galbraith and
                  John Malone{-}Lee and
                  Nigel P. Smart},
  title        = {Public key signatures in the multi-user setting},
  journal      = {Inf. Process. Lett.},
  volume       = {83},
  number       = {5},
  pages        = {263--266},
  year         = {2002},
  url          = {https://doi.org/10.1016/S0020-0190(01)00338-6},
  doi          = {10.1016/S0020-0190(01)00338-6},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/GalbraithMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/Galbraith02,
  author       = {Steven D. Galbraith},
  title        = {Elliptic Curve Paillier Schemes},
  journal      = {J. Cryptol.},
  volume       = {15},
  number       = {2},
  pages        = {129--138},
  year         = {2002},
  url          = {https://doi.org/10.1007/s00145-001-0015-6},
  doi          = {10.1007/S00145-001-0015-6},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/Galbraith02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/moc/GalbraithPS02,
  author       = {Steven D. Galbraith and
                  Sachar M. Paulus and
                  Nigel P. Smart},
  title        = {Arithmetic on superelliptic curves},
  journal      = {Math. Comput.},
  volume       = {71},
  number       = {237},
  pages        = {393--405},
  year         = {2002},
  url          = {https://doi.org/10.1090/S0025-5718-00-01297-7},
  doi          = {10.1090/S0025-5718-00-01297-7},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/moc/GalbraithPS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ants/GalbraithHS02,
  author       = {Steven D. Galbraith and
                  Keith Harrison and
                  David Soldera},
  editor       = {Claus Fieker and
                  David R. Kohel},
  title        = {Implementing the Tate Pairing},
  booktitle    = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney,
                  Australia, July 7-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2369},
  pages        = {324--337},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45455-1\_26},
  doi          = {10.1007/3-540-45455-1\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ants/GalbraithHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/GalbraithMP02,
  author       = {Steven D. Galbraith and
                  Wenbo Mao and
                  Kenneth G. Paterson},
  editor       = {Bart Preneel},
  title        = {RSA-Based Undeniable Signatures for General Moduli},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at
                  the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2271},
  pages        = {200--217},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45760-7\_14},
  doi          = {10.1007/3-540-45760-7\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/GalbraithMP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/GalbraithHS02,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Nigel P. Smart},
  editor       = {Lars R. Knudsen},
  title        = {Extending the {GHS} Weil Descent Attack},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference
                  on the Theory and Applications of Cryptographic Techniques, Amsterdam,
                  The Netherlands, April 28 - May 2, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2332},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-46035-7\_3},
  doi          = {10.1007/3-540-46035-7\_3},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/GalbraithHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHS02,
  author       = {Steven D. Galbraith and
                  Herbie J. Hopkins and
                  Igor E. Shparlinski},
  title        = {Secure Bilinear Diffie-Hellman Bits},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {155},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/155},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/endm/Galbraith01,
  author       = {Steven D. Galbraith},
  title        = {Weil Descent Of Jacobians},
  journal      = {Electron. Notes Discret. Math.},
  volume       = {6},
  pages        = {459--468},
  year         = {2001},
  url          = {https://doi.org/10.1016/S1571-0653(04)00198-2},
  doi          = {10.1016/S1571-0653(04)00198-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/endm/Galbraith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Galbraith01,
  author       = {Steven D. Galbraith},
  editor       = {Colin Boyd},
  title        = {Supersingular Curves in Cryptography},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Gold Coast, Australia, December 9-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2248},
  pages        = {495--513},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45682-1\_29},
  doi          = {10.1007/3-540-45682-1\_29},
  timestamp    = {Tue, 01 Jun 2021 15:22:33 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Galbraith01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Galbraith01a,
  author       = {Steven D. Galbraith},
  title        = {Elliptic curve Paillier schemes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {50},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/050},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Galbraith01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GalbraithHS01,
  author       = {Steven D. Galbraith and
                  Florian Hess and
                  Nigel P. Smart},
  title        = {Extending the {GHS} Weil Descent Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {54},
  year         = {2001},
  url          = {http://eprint.iacr.org/2001/054},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/em/Galbraith99,
  author       = {Steven D. Galbraith},
  title        = {Rational Points on X\({}_{\mbox{O}}\) \({}^{\mbox{+}}\)(p)},
  journal      = {Exp. Math.},
  volume       = {8},
  number       = {4},
  pages        = {311--318},
  year         = {1999},
  url          = {https://doi.org/10.1080/10586458.1999.10504621},
  doi          = {10.1080/10586458.1999.10504621},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/em/Galbraith99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/lmsjcm/Galbraith99,
  author       = {Steven D. Galbraith},
  title        = {Constructing Isogenies between Elliptic Curves Over Finite Fields},
  journal      = {{LMS} J. Comput. Math.},
  volume       = {2},
  pages        = {118--138},
  year         = {1999},
  url          = {https://doi.org/10.1112/s1461157000000097},
  doi          = {10.1112/S1461157000000097},
  timestamp    = {Fri, 05 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/lmsjcm/Galbraith99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BlackburnG99,
  author       = {Simon R. Blackburn and
                  Steven D. Galbraith},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Cryptanalysis of Two Cryptosystems Based on Group Actions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {52--61},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_6},
  doi          = {10.1007/978-3-540-48000-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/BlackburnG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/GalbraithS99,
  author       = {Steven D. Galbraith and
                  Nigel P. Smart},
  editor       = {Michael Walker},
  title        = {A Cryptographic Application of Weil Descent},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_23},
  doi          = {10.1007/3-540-46665-7\_23},
  timestamp    = {Wed, 18 Mar 2020 16:00:59 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/GalbraithS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/BlackburnBBG99,
  author       = {Simon R. Blackburn and
                  Simon Blake{-}Wilson and
                  Mike Burmester and
                  Steven D. Galbraith},
  editor       = {Michael Walker},
  title        = {Weaknesses in Shared {RSA} Key Generation Protocols},
  booktitle    = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester,
                  UK, December 20-22, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1746},
  pages        = {300--306},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-46665-7\_34},
  doi          = {10.1007/3-540-46665-7\_34},
  timestamp    = {Wed, 18 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/BlackburnBBG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics