Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Steven D. Galbraith
@article{DBLP:journals/iacr/GalbraithLM24, author = {Steven D. Galbraith and Yi{-}Fu Lai and Hart Montgomery}, title = {A Simpler and More Efficient Reduction of DLog to {CDH} for Abelian Group Actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {191}, year = {2024}, url = {https://eprint.iacr.org/2024/191}, timestamp = {Fri, 16 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithGRS23, author = {Steven D. Galbraith and Rosario Gennaro and Carla R{\`{a}}fols and Ron Steinfeld}, title = {Guest editorial: Special issue on Mathematics of Zero-Knowledge}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3331--3332}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01260-2}, doi = {10.1007/S10623-023-01260-2}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithGRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BeullensFGP23, author = {Ward Beullens and Luca De Feo and Steven D. Galbraith and Christophe Petit}, title = {Proving knowledge of isogenies: a survey}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {11}, pages = {3425--3456}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01243-3}, doi = {10.1007/S10623-023-01243-3}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/BeullensFGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cpss/BanerjeeGKCR23, author = {Shalini Banerjee and Steven D. Galbraith and Tariq Khan and John Henry Castellanos and Giovanni Russello}, editor = {Rodrigo Roman and Mujeeb Ahmed}, title = {Preventing Reverse Engineering of Control Programs in Industrial Control Systems}, booktitle = {Proceedings of the 9th {ACM} Cyber-Physical System Security Workshop, {CPSS} 2023, Melbourne, VIC, Australia, July 10-14, 2023}, pages = {48--59}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3592538.3594275}, doi = {10.1145/3592538.3594275}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cpss/BanerjeeGKCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/BanerjeeGR23, author = {Shalini Banerjee and Steven D. Galbraith and Giovanni Russello}, editor = {Anupam Chattopadhyay and Shivam Bhasin and Stjepan Picek and Chester Rebeiro}, title = {Obfuscating Evasive Decision Trees}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2023 - 24th International Conference on Cryptology in India, Goa, India, December 10-13, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14460}, pages = {84--104}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-56235-8\_5}, doi = {10.1007/978-3-031-56235-8\_5}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/BanerjeeGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanerjeeGR23, author = {Shalini Banerjee and Steven D. Galbraith and Giovanni Russello}, title = {Obfuscating Decision Trees}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {68}, year = {2023}, url = {https://eprint.iacr.org/2023/068}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BanerjeeGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeullensFGP23, author = {Ward Beullens and Luca De Feo and Steven D. Galbraith and Christophe Petit}, title = {Proving knowledge of isogenies - {A} survey}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {671}, year = {2023}, url = {https://eprint.iacr.org/2023/671}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeullensFGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanerjeeG23, author = {Shalini Banerjee and Steven D. Galbraith}, title = {Auditable Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1476}, year = {2023}, url = {https://eprint.iacr.org/2023/1476}, timestamp = {Sat, 07 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanerjeeG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPV23, author = {Steven D. Galbraith and Derek Perrin and Jos{\'{e}} Felipe Voloch}, title = {{CSIDH} with Level Structure}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1726}, year = {2023}, url = {https://eprint.iacr.org/2023/1726}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FeoDGZ22, author = {Luca De Feo and Samuel Dobson and Steven D. Galbraith and Lukas Zobernig}, editor = {Shweta Agrawal and Dongdai Lin}, title = {{SIDH} Proof of Knowledge}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {310--339}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_11}, doi = {10.1007/978-3-031-22966-4\_11}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FeoDGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/GalbraithL22, author = {Steven D. Galbraith and Yi{-}Fu Lai}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Attack on SHealS and HealS: The Second Wave of {GPST}}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {399--421}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_19}, doi = {10.1007/978-3-031-17234-2\_19}, timestamp = {Sun, 12 Nov 2023 02:15:49 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/GalbraithL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/DobsonG22, author = {Samuel Dobson and Steven D. Galbraith}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {Post-Quantum Signal Key Agreement from {SIDH}}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {422--450}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_20}, doi = {10.1007/978-3-031-17234-2\_20}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/DobsonG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ctrsa/2022, editor = {Steven D. Galbraith}, title = {Topics in Cryptology - {CT-RSA} 2022 - Cryptographers' Track at the {RSA} Conference 2022, Virtual Event, March 1-2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13161}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-030-95312-6}, doi = {10.1007/978-3-030-95312-6}, isbn = {978-3-030-95311-9}, timestamp = {Thu, 03 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/2022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2205-00135, author = {Jeremy Booher and Ross Bowden and Javad Doliskani and Tako Boris Fouotsa and Steven D. Galbraith and Sabrina Kunzweiler and Simon{-}Philipp Merz and Christophe Petit and Benjamin Smith and Katherine E. Stange and Yan Bo Ti and Christelle Vincent and Jos{\'{e}} Felipe Voloch and Charlotte Weitk{\"{a}}mper and Lukas Zobernig}, title = {Failing to hash into supersingular isogeny graphs}, journal = {CoRR}, volume = {abs/2205.00135}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2205.00135}, doi = {10.48550/ARXIV.2205.00135}, eprinttype = {arXiv}, eprint = {2205.00135}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2205-00135.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2211-16128, author = {Samuel Dobson and Steven D. Galbraith and Benjamin Smith}, title = {Trustless unknown-order groups}, journal = {CoRR}, volume = {abs/2211.16128}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2211.16128}, doi = {10.48550/ARXIV.2211.16128}, eprinttype = {arXiv}, eprint = {2211.16128}, timestamp = {Sun, 04 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2211-16128.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithL22, author = {Steven D. Galbraith and Yi{-}Fu Lai}, title = {Attack on SHealS and HealS: the Second Wave of {GPST}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {443}, year = {2022}, url = {https://eprint.iacr.org/2022/443}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BooherBDFGKMPSS22, author = {Jeremy Booher and Ross Bowden and Javad Doliskani and Tako Boris Fouotsa and Steven D. Galbraith and Sabrina Kunzweiler and Simon{-}Philipp Merz and Christophe Petit and Benjamin Smith and Katherine E. Stange and Yan Bo Ti and Christelle Vincent and Jos{\'{e}} Felipe Voloch and Charlotte Weitk{\"{a}}mper and Lukas Zobernig}, title = {Failing to hash into supersingular isogeny graphs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {518}, year = {2022}, url = {https://eprint.iacr.org/2022/518}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BooherBDFGKMPSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithL22a, author = {Steven D. Galbraith and Trey Li}, title = {Obfuscation of Evasive Algebraic Set Membership}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1516}, year = {2022}, url = {https://eprint.iacr.org/2022/1516}, timestamp = {Wed, 23 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithL22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmcst/DobsonGLTZ21, author = {Samuel Dobson and Steven D. Galbraith and Jason T. LeGrow and Yan Bo Ti and Lukas Zobernig}, title = {An adaptive attack on 2-SIDH}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {6}, number = {4}, pages = {387--404}, year = {2021}, url = {https://doi.org/10.1080/23799927.2021.2018115}, doi = {10.1080/23799927.2021.2018115}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmcst/DobsonGLTZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/CuiSAGR21, author = {Shujie Cui and Xiangfu Song and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, title = {Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage}, journal = {{ACM} Trans. Priv. Secur.}, volume = {24}, number = {3}, pages = {18:1--18:35}, year = {2021}, url = {https://doi.org/10.1145/3446920}, doi = {10.1145/3446920}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tissec/CuiSAGR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithL21, author = {Steven D. Galbraith and Trey Li}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Small Superset and Big Subset Obfuscation}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {68--87}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_4}, doi = {10.1007/978-3-030-90567-5\_4}, timestamp = {Mon, 08 Nov 2021 16:43:35 +0100}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LaiGG21, author = {Yi{-}Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem}, editor = {Anne Canteaut and Fran{\c{c}}ois{-}Xavier Standaert}, title = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12696}, pages = {213--241}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-77870-5\_8}, doi = {10.1007/978-3-030-77870-5\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LaiGG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoDGZ21, author = {Luca De Feo and Samuel Dobson and Steven D. Galbraith and Lukas Zobernig}, title = {{SIDH} Proof of Knowledge}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1023}, year = {2021}, url = {https://eprint.iacr.org/2021/1023}, timestamp = {Mon, 06 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoDGZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobsonG21, author = {Samuel Dobson and Steven D. Galbraith}, title = {Post-Quantum Signal Key Agreement with {SIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1187}, year = {2021}, url = {https://eprint.iacr.org/2021/1187}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobsonG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cacm/PhanABCDGGHKLLM20, author = {Raphael C.{-}W. Phan and Masayuki Abe and Lynn Batten and Jung Hee Cheon and Ed Dawson and Steven D. Galbraith and Jian Guo and Lucas C. K. Hui and Kwangjo Kim and Xuejia Lai and Dong Hoon Lee and Mitsuru Matsui and Tsutomu Matsumoto and Shiho Moriai and Phong Q. Nguyen and Dingyi Pei and Duong Hieu Phan and Josef Pieprzyk and Huaxiong Wang and Hank Wolfe and Duncan S. Wong and Tzong{-}Chen Wu and Bo{-}Yin Yang and Siu{-}Ming Yiu and Yu Yu and Jianying Zhou}, title = {Advances in security research in the Asiacrypt region}, journal = {Commun. {ACM}}, volume = {63}, number = {4}, pages = {76--81}, year = {2020}, url = {https://doi.org/10.1145/3378428}, doi = {10.1145/3378428}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cacm/PhanABCDGGHKLLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcmcst/DobsonGLTZ20, author = {Samuel Dobson and Steven D. Galbraith and Jason T. LeGrow and Yan Bo Ti and Lukas Zobernig}, title = {An adaptive attack on 2-SIDH}, journal = {Int. J. Comput. Math. Comput. Syst. Theory}, volume = {5}, number = {4}, pages = {282--299}, year = {2020}, url = {https://doi.org/10.1080/23799927.2020.1822446}, doi = {10.1080/23799927.2020.1822446}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcmcst/DobsonGLTZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GalbraithPS20, author = {Steven D. Galbraith and Christophe Petit and Javier Silva}, title = {Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems}, journal = {J. Cryptol.}, volume = {33}, number = {1}, pages = {130--175}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09316-0}, doi = {10.1007/S00145-019-09316-0}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/GalbraithPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/DucasGPY20, author = {L{\'{e}}o Ducas and Steven D. Galbraith and Thomas Prest and Yang Yu}, editor = {Anne Canteaut and Yuval Ishai}, title = {Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12106}, pages = {608--637}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-45724-2\_21}, doi = {10.1007/978-3-030-45724-2\_21}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/DucasGPY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GalbraithZ20, author = {Steven D. Galbraith and Lukas Zobernig}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {Obfuscating Finite Automata}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {90--114}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_4}, doi = {10.1007/978-3-030-81652-0\_4}, timestamp = {Thu, 29 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/GalbraithZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/GalbraithGMP20, author = {Steven D. Galbraith and Robert Granger and Simon{-}Philipp Merz and Christophe Petit}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {On Index Calculus Algorithms for Subfield Curves}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {115--138}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_5}, doi = {10.1007/978-3-030-81652-0\_5}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/GalbraithGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/AsgharGLRZ20, author = {Muhammad Rizwan Asghar and Steven D. Galbraith and Andrea Lanzi and Giovanni Russello and Lukas Zobernig}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {Towards a Theory of Special-Purpose Program Obfuscation}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {394--401}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00061}, doi = {10.1109/TRUSTCOM50675.2020.00061}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/AsgharGLRZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-02607, author = {Muhammad Rizwan Asghar and Steven D. Galbraith and Andrea Lanzi and Giovanni Russello and Lukas Zobernig}, title = {Towards a Theory of Special-purpose Program Obfuscation}, journal = {CoRR}, volume = {abs/2011.02607}, year = {2020}, url = {https://arxiv.org/abs/2011.02607}, eprinttype = {arXiv}, eprint = {2011.02607}, timestamp = {Mon, 09 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-02607.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobsonG20, author = {Samuel Dobson and Steven D. Galbraith}, title = {Trustless Groups of Unknown Order with Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {196}, year = {2020}, url = {https://eprint.iacr.org/2020/196}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobsonG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithZ20, author = {Steven D. Galbraith and Lukas Zobernig}, title = {Obfuscating Finite Automata}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2020}, url = {https://eprint.iacr.org/2020/1009}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LaiGG20, author = {Yi{-}Fu Lai and Steven D. Galbraith and Cyprien Delpech de Saint Guilhem}, title = {Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2020}, url = {https://eprint.iacr.org/2020/1012}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LaiGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithL20, author = {Steven D. Galbraith and Trey Li}, title = {Big Subset and Small Superset Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1018}, year = {2020}, url = {https://eprint.iacr.org/2020/1018}, timestamp = {Wed, 02 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithGMP20, author = {Steven D. Galbraith and Robert Granger and Simon{-}Philipp Merz and Christophe Petit}, title = {On Index Calculus Algorithms for Subfield Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1315}, year = {2020}, url = {https://eprint.iacr.org/2020/1315}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithGMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BaiGLS19, author = {Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield}, title = {Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem}, journal = {J. Cryptol.}, volume = {32}, number = {1}, pages = {35--83}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9304-1}, doi = {10.1007/S00145-018-9304-1}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BaiGLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/FeoG19, author = {Luca De Feo and Steven D. Galbraith}, editor = {Yuval Ishai and Vincent Rijmen}, title = {SeaSign: Compact Isogeny Signatures from Class Group Actions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11478}, pages = {759--789}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17659-4\_26}, doi = {10.1007/978-3-030-17659-4\_26}, timestamp = {Fri, 31 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/FeoG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithMP19, author = {Steven D. Galbraith and Jake Massimo and Kenneth G. Paterson}, editor = {Dongdai Lin and Kazue Sako}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, booktitle = {Public-Key Cryptography - {PKC} 2019 - 22nd {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Beijing, China, April 14-17, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11443}, pages = {379--407}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-17259-6\_13}, doi = {10.1007/978-3-030-17259-6\_13}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/GalbraithZ19, author = {Steven D. Galbraith and Lukas Zobernig}, editor = {Dennis Hofheinz and Alon Rosen}, title = {Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems}, booktitle = {Theory of Cryptography - 17th International Conference, {TCC} 2019, Nuremberg, Germany, December 1-5, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11891}, pages = {81--110}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36030-6\_4}, doi = {10.1007/978-3-030-36030-6\_4}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/tcc/GalbraithZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZobernigGR19, author = {Lukas Zobernig and Steven D. Galbraith and Giovanni Russello}, title = {When are Opaque Predicates Useful?}, booktitle = {18th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 13th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2019, Rotorua, New Zealand, August 5-8, 2019}, pages = {168--175}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2019.00031}, doi = {10.1109/TRUSTCOM/BIGDATASE.2019.00031}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZobernigGR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2019-1, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5}, doi = {10.1007/978-3-030-34578-5}, isbn = {978-3-030-34577-8}, timestamp = {Tue, 26 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2019-2, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11922}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34621-8}, doi = {10.1007/978-3-030-34621-8}, isbn = {978-3-030-34620-1}, timestamp = {Fri, 22 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2019-3, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11923}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34618-8}, doi = {10.1007/978-3-030-34618-8}, isbn = {978-3-030-34617-1}, timestamp = {Fri, 22 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/2019-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ccs/2019asia, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705}, doi = {10.1145/3321705}, isbn = {978-1-4503-6752-3}, timestamp = {Tue, 10 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/2019asia.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-11624, author = {Shujie Cui and Xiangfu Song and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, title = {Privacy-preserving Searchable Databases with Controllable Leakage}, journal = {CoRR}, volume = {abs/1909.11624}, year = {2019}, url = {http://arxiv.org/abs/1909.11624}, eprinttype = {arXiv}, eprint = {1909.11624}, timestamp = {Fri, 27 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-11624.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithMP19, author = {Steven D. Galbraith and Jake Massimo and Kenneth G. Paterson}, title = {Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {32}, year = {2019}, url = {https://eprint.iacr.org/2019/032}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DucasGPY19, author = {L{\'{e}}o Ducas and Steven D. Galbraith and Thomas Prest and Yang Yu}, title = {Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {320}, year = {2019}, url = {https://eprint.iacr.org/2019/320}, timestamp = {Sun, 22 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/DucasGPY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithZ19, author = {Steven D. Galbraith and Lukas Zobernig}, title = {Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {620}, year = {2019}, url = {https://eprint.iacr.org/2019/620}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobsonGLTZ19, author = {Samuel Dobson and Steven D. Galbraith and Jason T. LeGrow and Yan Bo Ti and Lukas Zobernig}, title = {Extending the Adaptive Attack to 2-SIDH}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {890}, year = {2019}, url = {https://eprint.iacr.org/2019/890}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobsonGLTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DobsonG19, author = {Samuel Dobson and Steven D. Galbraith}, title = {On the Degree-Insensitive {SI-GDH} problem and assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {929}, year = {2019}, url = {https://eprint.iacr.org/2019/929}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DobsonG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cjtcs/GalbraithLS18, author = {Steven D. Galbraith and Joel Laity and Barak Shani}, title = {Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations}, journal = {Chic. J. Theor. Comput. Sci.}, volume = {2018}, year = {2018}, url = {http://cjtcs.cs.uchicago.edu/articles/2018/6/contents.html}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cjtcs/GalbraithLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qip/GalbraithV18, author = {Steven D. Galbraith and Frederik Vercauteren}, title = {Computational problems in supersingular elliptic curve isogenies}, journal = {Quantum Inf. Process.}, volume = {17}, number = {10}, pages = {265}, year = {2018}, url = {https://doi.org/10.1007/s11128-018-2023-6}, doi = {10.1007/S11128-018-2023-6}, timestamp = {Thu, 16 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qip/GalbraithV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2018-1, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2}, doi = {10.1007/978-3-030-03326-2}, isbn = {978-3-030-03325-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2018-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2018-2, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11273}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03329-3}, doi = {10.1007/978-3-030-03329-3}, isbn = {978-3-030-03328-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2018-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2018-3, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {11274}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03332-3}, doi = {10.1007/978-3-030-03332-3}, isbn = {978-3-030-03331-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2018-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1812-09116, author = {Steven D. Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren}, title = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions}, journal = {CoRR}, volume = {abs/1812.09116}, year = {2018}, url = {http://arxiv.org/abs/1812.09116}, eprinttype = {arXiv}, eprint = {1812.09116}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1812-09116.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith18, author = {Steven D. Galbraith}, title = {Authenticated key exchange for {SIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {266}, year = {2018}, url = {http://eprint.iacr.org/2018/266}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FeoG18, author = {Luca De Feo and Steven D. Galbraith}, title = {SeaSign: Compact isogeny signatures from class group actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {824}, year = {2018}, url = {https://eprint.iacr.org/2018/824}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FeoG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPSV18, author = {Steven D. Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren}, title = {Quantum Equivalence of the {DLP} and {CDHP} for Group Actions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1199}, year = {2018}, url = {https://eprint.iacr.org/2018/1199}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPSV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/GalbraithWZ17, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm}, journal = {Adv. Math. Commun.}, volume = {11}, number = {3}, pages = {453--469}, year = {2017}, url = {https://doi.org/10.3934/amc.2017038}, doi = {10.3934/AMC.2017038}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/GalbraithWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcloud/CuiAGR17, author = {Shujie Cui and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, editor = {Geoffrey C. Fox}, title = {P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases}, booktitle = {2017 {IEEE} 10th International Conference on Cloud Computing (CLOUD), Honolulu, HI, USA, June 25-30, 2017}, pages = {334--341}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/CLOUD.2017.50}, doi = {10.1109/CLOUD.2017.50}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcloud/CuiAGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/CuiAGR17, author = {Shujie Cui and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Secure and Practical Searchable Encryption: {A} Position Paper}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {266--281}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_14}, doi = {10.1007/978-3-319-60055-0\_14}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GalbraithPS17, author = {Steven D. Galbraith and Christophe Petit and Javier Silva}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, pages = {3--33}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8\_1}, doi = {10.1007/978-3-319-70694-8\_1}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/GalbraithPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fps/CuiAGR17, author = {Shujie Cui and Muhammad Rizwan Asghar and Steven D. Galbraith and Giovanni Russello}, editor = {Abdessamad Imine and Jos{\'{e}} M. Fernandez and Jean{-}Yves Marion and Luigi Logrippo and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage}, booktitle = {Foundations and Practice of Security - 10th International Symposium, {FPS} 2017, Nancy, France, October 23-25, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10723}, pages = {189--205}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-75650-9\_13}, doi = {10.1007/978-3-319-75650-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fps/CuiAGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithV17, author = {Steven D. Galbraith and Frederik Vercauteren}, title = {Computational problems in supersingular elliptic curve isogenies}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {774}, year = {2017}, url = {http://eprint.iacr.org/2017/774}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithV17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ZobernigGR17, author = {Lukas Zobernig and Steven D. Galbraith and Giovanni Russello}, title = {Indistinguishable Predicates: {A} New Tool for Obfuscation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {787}, year = {2017}, url = {http://eprint.iacr.org/2017/787}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ZobernigGR17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithG16, author = {Steven D. Galbraith and Pierrick Gaudry}, title = {Recent progress on the elliptic curve discrete logarithm problem}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {1}, pages = {51--72}, year = {2016}, url = {https://doi.org/10.1007/s10623-015-0146-7}, doi = {10.1007/S10623-015-0146-7}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/DelfsG16, author = {Christina Delfs and Steven D. Galbraith}, title = {Computing isogenies between supersingular elliptic curves over {\(\mathbb{F}\)}\({}_{\mbox{p}}\)}, journal = {Des. Codes Cryptogr.}, volume = {78}, number = {2}, pages = {425--440}, year = {2016}, url = {https://doi.org/10.1007/s10623-014-0010-1}, doi = {10.1007/S10623-014-0010-1}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/DelfsG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/GalbraithGM16, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy}, title = {Algorithms for the approximate common divisor problem}, journal = {{LMS} J. Comput. Math.}, volume = {19}, number = {A}, pages = {58--72}, year = {2016}, url = {https://doi.org/10.1112/s1461157016000218}, doi = {10.1112/S1461157016000218}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/GalbraithGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/GalbraithPST16, author = {Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {On the Security of Supersingular Isogeny Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {63--91}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_3}, doi = {10.1007/978-3-662-53887-6\_3}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/GalbraithPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiGM16, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, editor = {Liqun Chen and Jinguang Han}, title = {Preventing Adaptive Key Recovery Attacks on the {GSW} Levelled Homomorphic Encryption Scheme}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {373--383}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_22}, doi = {10.1007/978-3-319-47422-9\_22}, timestamp = {Wed, 14 Jul 2021 15:56:25 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/GalbraithLS16, author = {Steven D. Galbraith and Joel Laity and Barak Shani}, title = {Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations}, journal = {CoRR}, volume = {abs/1607.01842}, year = {2016}, url = {http://arxiv.org/abs/1607.01842}, eprinttype = {arXiv}, eprint = {1607.01842}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/GalbraithLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithGM16, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis and Sean Murphy}, title = {Algorithms for the Approximate Common Divisor Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {215}, year = {2016}, url = {http://eprint.iacr.org/2016/215}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLS16, author = {Steven D. Galbraith and Joel Laity and Barak Shani}, title = {Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {682}, year = {2016}, url = {http://eprint.iacr.org/2016/682}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPST16, author = {Steven D. Galbraith and Christophe Petit and Barak Shani and Yan Bo Ti}, title = {On the Security of Supersingular Isogeny Cryptosystems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {859}, year = {2016}, url = {http://eprint.iacr.org/2016/859}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiGM16, author = {Zengpeng Li and Steven D. Galbraith and Chunguang Ma}, title = {Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1146}, year = {2016}, url = {http://eprint.iacr.org/2016/1146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPS16, author = {Steven D. Galbraith and Christophe Petit and Javier Silva}, title = {Signature Schemes Based On Supersingular Isogeny Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1154}, year = {2016}, url = {http://eprint.iacr.org/2016/1154}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/GalbraithS15, author = {Steven D. Galbraith and Barak Shani}, editor = {Anja Lehmann and Stefan Wolf}, title = {The Multivariate Hidden Number Problem}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {250--268}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_15}, doi = {10.1007/978-3-319-17470-9\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/GalbraithS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/DahabGM15, author = {Ricardo Dahab and Steven D. Galbraith and Eduardo Morais}, editor = {Anja Lehmann and Stefan Wolf}, title = {Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes}, booktitle = {Information Theoretic Security - 8th International Conference, {ICITS} 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9063}, pages = {283--296}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-17470-9\_17}, doi = {10.1007/978-3-319-17470-9\_17}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icits/DahabGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/FowlerG15, author = {Alex Fowler and Steven D. Galbraith}, title = {Kangaroo Methods for Solving the Interval Discrete Logarithm Problem}, journal = {CoRR}, volume = {abs/1501.07019}, year = {2015}, url = {http://arxiv.org/abs/1501.07019}, eprinttype = {arXiv}, eprint = {1501.07019}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/FowlerG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithS15, author = {Steven D. Galbraith and Barak Shani}, title = {The Multivariate Hidden Number Problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2015}, url = {http://eprint.iacr.org/2015/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DahabGM15, author = {Ricardo Dahab and Steven D. Galbraith and Eduardo Morais}, title = {Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {127}, year = {2015}, url = {http://eprint.iacr.org/2015/127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DahabGM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithWZ15, author = {Steven D. Galbraith and Ping Wang and Fangguo Zhang}, title = {Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {605}, year = {2015}, url = {http://eprint.iacr.org/2015/605}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithG15, author = {Steven D. Galbraith and Pierrick Gaudry}, title = {Recent progress on the elliptic curve discrete logarithm problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1022}, year = {2015}, url = {http://eprint.iacr.org/2015/1022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/DwarakanathG14, author = {Nagarjun C. Dwarakanath and Steven D. Galbraith}, title = {Sampling from discrete Gaussians for lattice-based cryptography on a constrained device}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {25}, number = {3}, pages = {159--180}, year = {2014}, url = {https://doi.org/10.1007/s00200-014-0218-3}, doi = {10.1007/S00200-014-0218-3}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aaecc/DwarakanathG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithZ14, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Erratum Self-pairings on hyperelliptic curves {[J.} Math. Cryptol. 7(2013), 31-42]}, journal = {J. Math. Cryptol.}, volume = {8}, number = {1}, pages = {93}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-5010}, doi = {10.1515/JMC-2013-5010}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/ChevyrevG14, author = {Ilya Chevyrev and Steven D. Galbraith}, title = {Constructing supersingular elliptic curves with a given endomorphism ring}, journal = {{LMS} J. Comput. Math.}, volume = {17}, number = {Theory}, pages = {71--91}, year = {2014}, url = {https://doi.org/10.1112/s1461157014000254}, doi = {10.1112/S1461157014000254}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/lmsjcm/ChevyrevG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BaiG14, author = {Shi Bai and Steven D. Galbraith}, editor = {Willy Susilo and Yi Mu}, title = {Lattice Decoding Attacks on Binary {LWE}}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {322--337}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_21}, doi = {10.1007/978-3-319-08344-5\_21}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BaiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BaiG14, author = {Shi Bai and Steven D. Galbraith}, editor = {Josh Benaloh}, title = {An Improved Compression Technique for Signatures Based on Learning with Errors}, booktitle = {Topics in Cryptology - {CT-RSA} 2014 - The Cryptographer's Track at the {RSA} Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8366}, pages = {28--47}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-04852-9\_2}, doi = {10.1007/978-3-319-04852-9\_2}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BaiG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GalbraithG14, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis}, editor = {Willi Meier and Debdeep Mukhopadhyay}, title = {Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8885}, pages = {409--427}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13039-2\_24}, doi = {10.1007/978-3-319-13039-2\_24}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GalbraithG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiGLS14, author = {Shi Bai and Steven D. Galbraith and Liangze Li and Daniel Sheffield}, title = {Improved Exponential-time Algorithms for Inhomogeneous-SIS}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {593}, year = {2014}, url = {http://eprint.iacr.org/2014/593}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiGLS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithG14, author = {Steven D. Galbraith and Shishay W. Gebregiyorgis}, title = {Summation polynomial algorithms for elliptic curves in characteristic two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {806}, year = {2014}, url = {http://eprint.iacr.org/2014/806}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/GalbraithS13, author = {Steven D. Galbraith and Anton Stolbunov}, title = {Improved algorithm for the isogeny problem for ordinary elliptic curves}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {24}, number = {2}, pages = {107--131}, year = {2013}, url = {https://doi.org/10.1007/s00200-013-0185-0}, doi = {10.1007/S00200-013-0185-0}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/GalbraithS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithZ13, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Self-pairings on hyperelliptic curves}, journal = {J. Math. Cryptol.}, volume = {7}, number = {1}, pages = {31--42}, year = {2013}, url = {https://doi.org/10.1515/jmc-2012-0009}, doi = {10.1515/JMC-2012-0009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/GalbraithPR13, author = {Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai}, title = {Computing discrete logarithms in an interval}, journal = {Math. Comput.}, volume = {82}, number = {282}, pages = {1181--1195}, year = {2013}, url = {https://doi.org/10.1090/S0025-5718-2012-02641-X}, doi = {10.1090/S0025-5718-2012-02641-X}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/GalbraithPR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiG13, author = {Shi Bai and Steven D. Galbraith}, title = {An improved compression technique for signatures based on learning with errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2013}, url = {http://eprint.iacr.org/2013/838}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaiG13a, author = {Shi Bai and Steven D. Galbraith}, title = {Lattice Decoding Attacks on Binary {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {839}, year = {2013}, url = {http://eprint.iacr.org/2013/839}, timestamp = {Tue, 30 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BaiG13a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/cu/Galbraith2012, author = {Steven D. Galbraith}, title = {Mathematics of Public Key Cryptography}, publisher = {Cambridge University Press}, year = {2012}, url = {https://www.math.auckland.ac.nz/\%7Esgal018/crypto-book/crypto-book.html}, isbn = {9781107013926}, timestamp = {Fri, 12 Feb 2016 00:00:00 +0100}, biburl = {https://dblp.org/rec/books/cu/Galbraith2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GalbraithH12, author = {Steven D. Galbraith and Mark Holmes}, title = {A non-uniform birthday problem with applications to discrete logarithms}, journal = {Discret. Appl. Math.}, volume = {160}, number = {10-11}, pages = {1547--1560}, year = {2012}, url = {https://doi.org/10.1016/j.dam.2012.02.019}, doi = {10.1016/J.DAM.2012.02.019}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GalbraithH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/indocrypt/2012, editor = {Steven D. Galbraith and Mridul Nandi}, title = {Progress in Cryptology - {INDOCRYPT} 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7668}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34931-7}, doi = {10.1007/978-3-642-34931-7}, isbn = {978-3-642-34930-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithZ12, author = {Steven D. Galbraith and Chang{-}An Zhao}, title = {Self-pairings on Hyperelliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {267}, year = {2012}, url = {http://eprint.iacr.org/2012/267}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/EagleGO11, author = {Philip N. J. Eagle and Steven D. Galbraith and John Ong}, title = {Point compression for Koblitz elliptic curves}, journal = {Adv. Math. Commun.}, volume = {5}, number = {1}, pages = {1--10}, year = {2011}, url = {https://doi.org/10.3934/amc.2011.5.1}, doi = {10.3934/AMC.2011.5.1}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/EagleGO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AvanziJGM11, author = {Roberto Avanzi and Waldyr D. Benits Junior and Steven D. Galbraith and James F. McKee}, title = {On the distribution of the coefficients of normal forms for Frobenius expansions}, journal = {Des. Codes Cryptogr.}, volume = {61}, number = {1}, pages = {71--89}, year = {2011}, url = {https://doi.org/10.1007/s10623-010-9439-z}, doi = {10.1007/S10623-010-9439-Z}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AvanziJGM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/GalbraithLS11, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves}, journal = {J. Cryptol.}, volume = {24}, number = {3}, pages = {446--469}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9065-y}, doi = {10.1007/S00145-010-9065-Y}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/GalbraithLS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1105-6331, author = {Steven D. Galbraith and Anton Stolbunov}, title = {Improved Algorithm for the Isogeny Problem for Ordinary Elliptic Curves}, journal = {CoRR}, volume = {abs/1105.6331}, year = {2011}, url = {http://arxiv.org/abs/1105.6331}, eprinttype = {arXiv}, eprint = {1105.6331}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1105-6331.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithR10, author = {Steven D. Galbraith and Raminder S. Ruprai}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {368--383}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_22}, doi = {10.1007/978-3-642-13013-7\_22}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithR10, author = {Steven D. Galbraith and Raminder S. Ruprai}, title = {Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {615}, year = {2010}, url = {http://eprint.iacr.org/2010/615}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithH10, author = {Steven D. Galbraith and Mark Holmes}, title = {A non-uniform birthday problem with applications to discrete logarithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {616}, year = {2010}, url = {http://eprint.iacr.org/2010/616}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPR10, author = {Steven D. Galbraith and John M. Pollard and Raminder S. Ruprai}, title = {Computing Discrete Logarithms in an Interval}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {617}, year = {2010}, url = {http://eprint.iacr.org/2010/617}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/GalbraithL09, author = {Steven D. Galbraith and Xibin Lin}, title = {Computing pairings using \emph{x} -coordinates only}, journal = {Des. Codes Cryptogr.}, volume = {50}, number = {3}, pages = {305--324}, year = {2009}, url = {https://doi.org/10.1007/s10623-008-9233-3}, doi = {10.1007/S10623-008-9233-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/GalbraithL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithPRS09, author = {Steven D. Galbraith and Jordi Pujol{\`{a}}s and Christophe Ritzenthaler and Benjamin A. Smith}, title = {Distortion maps for supersingular genus two curves}, journal = {J. Math. Cryptol.}, volume = {3}, number = {1}, pages = {1--18}, year = {2009}, url = {https://doi.org/10.1515/JMC.2009.001}, doi = {10.1515/JMC.2009.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithPRS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GalbraithLS09, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, editor = {Antoine Joux}, title = {Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {518--535}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_30}, doi = {10.1007/978-3-642-01001-9\_30}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GalbraithLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalbraithR09, author = {Steven D. Galbraith and Raminder S. Ruprai}, editor = {Matthew Geoffrey Parker}, title = {An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems}, booktitle = {Cryptography and Coding, 12th {IMA} International Conference, Cryptography and Coding 2009, Cirencester, UK, December 15-17, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5921}, pages = {368--382}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10868-6\_22}, doi = {10.1007/978-3-642-10868-6\_22}, timestamp = {Wed, 01 Sep 2021 10:36:08 +0200}, biburl = {https://dblp.org/rec/conf/ima/GalbraithR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EagleGO09, author = {Philip N. J. Eagle and Steven D. Galbraith and John Ong}, title = {Point Compression for Koblitz Elliptic Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {86}, year = {2009}, url = {http://eprint.iacr.org/2009/086}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EagleGO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/GalbraithR08, author = {Steven D. Galbraith and Raminder S. Ruprai}, title = {Computing L-polynomials of non-hyperelliptic genus 4 and 5 curves (abstract only)}, journal = {{ACM} Commun. Comput. Algebra}, volume = {42}, number = {1-2}, pages = {56--57}, year = {2008}, url = {https://doi.org/10.1145/1394042.1394069}, doi = {10.1145/1394042.1394069}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cca/GalbraithR08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/GalbraithPS08, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for cryptographers}, journal = {Discret. Appl. Math.}, volume = {156}, number = {16}, pages = {3113--3121}, year = {2008}, url = {https://doi.org/10.1016/j.dam.2007.12.010}, doi = {10.1016/J.DAM.2007.12.010}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/GalbraithPS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/GalbraithHV08, author = {Steven D. Galbraith and Florian Hess and Frederik Vercauteren}, title = {Aspects of Pairing Inversion}, journal = {{IEEE} Trans. Inf. Theory}, volume = {54}, number = {12}, pages = {5719--5728}, year = {2008}, url = {https://doi.org/10.1109/TIT.2008.2006431}, doi = {10.1109/TIT.2008.2006431}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/GalbraithHV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/GalbraithHM08, author = {Steven D. Galbraith and Michael Harrison and David J. Mireles Morales}, editor = {Alfred J. van der Poorten and Andreas Stein}, title = {Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors}, booktitle = {Algorithmic Number Theory, 8th International Symposium, ANTS-VIII, Banff, Canada, May 17-22, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5011}, pages = {342--356}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79456-1\_23}, doi = {10.1007/978-3-540-79456-1\_23}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ants/GalbraithHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/GalbraithS08, author = {Steven D. Galbraith and Michael Scott}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Exponentiation in Pairing-Friendly Groups Using Homomorphisms}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {211--224}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_15}, doi = {10.1007/978-3-540-85538-5\_15}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/GalbraithS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/GalbraithLM08, author = {Steven D. Galbraith and Xibin Lin and David J. Mireles Morales}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Pairings on Hyperelliptic Curves with a Real Model}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {265--281}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_18}, doi = {10.1007/978-3-540-85538-5\_18}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/GalbraithLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/GalbraithV08, author = {Steven D. Galbraith and Eric R. Verheul}, editor = {Ronald Cramer}, title = {An Analysis of the Vector Decomposition Problem}, booktitle = {Public Key Cryptography - {PKC} 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4939}, pages = {308--327}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78440-1\_18}, doi = {10.1007/978-3-540-78440-1\_18}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/GalbraithV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2008, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5}, doi = {10.1007/978-3-540-85538-5}, isbn = {978-3-540-85503-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2008.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithL08, author = {Steven D. Galbraith and Xibin Lin}, title = {Computing Pairings Using x-Coordinates Only}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {19}, year = {2008}, url = {http://eprint.iacr.org/2008/019}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithS08, author = {Steven D. Galbraith and Michael Scott}, title = {Exponentiation in pairing-friendly groups using homomorphisms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {117}, year = {2008}, url = {http://eprint.iacr.org/2008/117}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLS08, author = {Steven D. Galbraith and Xibin Lin and Michael Scott}, title = {Endomorphisms for faster elliptic curve cryptography on a large class of curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {194}, year = {2008}, url = {http://eprint.iacr.org/2008/194}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/CastryckGF08, author = {Wouter Castryck and Steven D. Galbraith and Reza Rezaeian Farashahi}, title = {Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {218}, year = {2008}, url = {http://eprint.iacr.org/2008/218}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/CastryckGF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithLM08, author = {Steven D. Galbraith and Xibin Lin and David J. Mireles Morales}, title = {Pairings on hyperelliptic curves with a real model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {250}, year = {2008}, url = {http://eprint.iacr.org/2008/250}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithLM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHM08, author = {Steven D. Galbraith and Michael Harrison and David J. Mireles Morales}, title = {Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {265}, year = {2008}, url = {http://eprint.iacr.org/2008/265}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BarretoGOS07, author = {Paulo S. L. M. Barreto and Steven D. Galbraith and Colm O'hEigeartaigh and Michael Scott}, title = {Efficient pairing computation on supersingular Abelian varieties}, journal = {Des. Codes Cryptogr.}, volume = {42}, number = {3}, pages = {239--271}, year = {2007}, url = {https://doi.org/10.1007/s10623-006-9033-6}, doi = {10.1007/S10623-006-9033-6}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BarretoGOS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/GalbraithMV07, author = {Steven D. Galbraith and James F. McKee and P. C. Valen{\c{c}}a}, title = {Ordinary abelian varieties having small embedding degree}, journal = {Finite Fields Their Appl.}, volume = {13}, number = {4}, pages = {800--814}, year = {2007}, url = {https://doi.org/10.1016/j.ffa.2007.02.003}, doi = {10.1016/J.FFA.2007.02.003}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/GalbraithMV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/GalbraithhS07, author = {Steven D. Galbraith and Colm O'hEigeartaigh and Caroline Sheedy}, title = {Simplified pairing computation and security implications}, journal = {J. Math. Cryptol.}, volume = {1}, number = {3}, pages = {267--281}, year = {2007}, url = {https://doi.org/10.1515/JMC.2007.013}, doi = {10.1515/JMC.2007.013}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/GalbraithhS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/JuniorG07, author = {Waldyr D. Benits Junior and Steven D. Galbraith}, editor = {Steven D. Galbraith}, title = {Constructing Pairing-Friendly Elliptic Curves Using Gr{\"{o}}bner Basis Reduction}, booktitle = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, pages = {336--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9\_20}, doi = {10.1007/978-3-540-77272-9\_20}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/JuniorG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/GalbraithHV07, author = {Steven D. Galbraith and Florian Hess and Frederik Vercauteren}, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Hyperelliptic Pairings}, booktitle = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, pages = {108--131}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5\_7}, doi = {10.1007/978-3-540-73489-5\_7}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/GalbraithHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/weworc/JuniorG07, author = {Waldyr D. Benits Junior and Steven D. Galbraith}, editor = {Stefan Lucks and Ahmad{-}Reza Sadeghi and Christopher Wolf}, title = {The {GPS} Identification Scheme Using Frobenius Expansions}, booktitle = {Research in Cryptology, Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4945}, pages = {13--27}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-88353-1\_2}, doi = {10.1007/978-3-540-88353-1\_2}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/weworc/JuniorG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ima/2007, editor = {Steven D. Galbraith}, title = {Cryptography and Coding, 11th {IMA} International Conference, Cirencester, UK, December 18-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4887}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77272-9}, doi = {10.1007/978-3-540-77272-9}, isbn = {978-3-540-77271-2}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHV07, author = {Steven D. Galbraith and Florian Hess and Frederik Vercauteren}, title = {Aspects of Pairing Inversion}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {256}, year = {2007}, url = {http://eprint.iacr.org/2007/256}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/DentG06, author = {Alexander W. Dent and Steven D. Galbraith}, editor = {Florian Hess and Sebastian Pauli and Michael E. Pohst}, title = {Hidden Pairings and Trapdoor {DDH} Groups}, booktitle = {Algorithmic Number Theory, 7th International Symposium, ANTS-VII, Berlin, Germany, July 23-28, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4076}, pages = {436--451}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11792086\_31}, doi = {10.1007/11792086\_31}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ants/DentG06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPS06, author = {Steven D. Galbraith and Kenneth G. Paterson and Nigel P. Smart}, title = {Pairings for Cryptographers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {165}, year = {2006}, url = {http://eprint.iacr.org/2006/165}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithOS06, author = {Steven D. Galbraith and Colm O'hEigeartaigh and Caroline Sheedy}, title = {Simplified pairing computation and security implications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {169}, year = {2006}, url = {http://eprint.iacr.org/2006/169}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithOS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith06, author = {Steven D. Galbraith}, title = {Disguising tori and elliptic curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2006}, url = {http://eprint.iacr.org/2006/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithS06, author = {Steven D. Galbraith and Benjamin A. Smith}, title = {Discrete Logarithms in Generalized Jacobians}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {333}, year = {2006}, url = {http://eprint.iacr.org/2006/333}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithPRS06, author = {Steven D. Galbraith and Jordi Pujol{\`{a}}s and Christophe Ritzenthaler and Benjamin A. Smith}, title = {Distortion maps for genus two curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2006}, url = {http://eprint.iacr.org/2006/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithPRS06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/GalbraithM05, author = {Steven D. Galbraith and Alfred Menezes}, title = {Algebraic curves and cryptography}, journal = {Finite Fields Their Appl.}, volume = {11}, number = {3}, pages = {544--577}, year = {2005}, url = {https://doi.org/10.1016/j.ffa.2005.05.001}, doi = {10.1016/J.FFA.2005.05.001}, timestamp = {Fri, 12 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/GalbraithM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithHM05, author = {Steven D. Galbraith and Chris Heneghan and James F. McKee}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Tunable Balancing of {RSA}}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {280--292}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_24}, doi = {10.1007/11506157\_24}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithHM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalbraithM05, author = {Steven D. Galbraith and James F. McKee}, editor = {Nigel P. Smart}, title = {Pairings on Elliptic Curves over Finite Commutative Rings}, booktitle = {Cryptography and Coding, 10th {IMA} International Conference, Cirencester, UK, December 19-21, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3796}, pages = {392--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11586821\_26}, doi = {10.1007/11586821\_26}, timestamp = {Wed, 18 Mar 2020 16:00:57 +0100}, biburl = {https://dblp.org/rec/conf/ima/GalbraithM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith05, author = {Steven D. Galbraith}, title = {The Weil pairing on elliptic curves over {C}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {323}, year = {2005}, url = {http://eprint.iacr.org/2005/323}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/GalbraithR04, author = {Steven D. Galbraith and Victor Rotger}, title = {Easy Decision Diffie-Hellman Groups}, journal = {{LMS} J. Comput. Math.}, volume = {7}, pages = {201--218}, year = {2004}, url = {https://doi.org/10.1112/s1461157000001108}, doi = {10.1112/S1461157000001108}, timestamp = {Wed, 03 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmsjcm/GalbraithR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/GalbraithHS04, author = {Steven D. Galbraith and Herbie J. Hopkins and Igor E. Shparlinski}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {Secure Bilinear Diffie-Hellman Bits}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {370--378}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_32}, doi = {10.1007/978-3-540-27800-9\_32}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/GalbraithHS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithR04, author = {Steven D. Galbraith and Victor Rotger}, title = {Easy decision-Diffie-Hellman groups}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {70}, year = {2004}, url = {http://eprint.iacr.org/2004/070}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithR04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithMV04, author = {Steven D. Galbraith and James F. McKee and P. C. Valen{\c{c}}a}, title = {Ordinary abelian varieties having small embedding degree}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {365}, year = {2004}, url = {http://eprint.iacr.org/2004/365}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithMV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BarretoGhS04, author = {Paulo S. L. M. Barreto and Steven D. Galbraith and Colm O'hEigeartaigh and Michael Scott}, title = {Efficient Pairing Computation on Supersingular Abelian Varieties}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {375}, year = {2004}, url = {http://eprint.iacr.org/2004/375}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BarretoGhS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/Galbraith03, author = {Steven D. Galbraith}, title = {Weil Descent of Jacobians}, journal = {Discret. Appl. Math.}, volume = {128}, number = {1}, pages = {165--180}, year = {2003}, url = {https://doi.org/10.1016/S0166-218X(02)00443-2}, doi = {10.1016/S0166-218X(02)00443-2}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dam/Galbraith03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GalbraithM03, author = {Steven D. Galbraith and Wenbo Mao}, editor = {Marc Joye}, title = {Invisibility and Anonymity of Undeniable and Confirmer Signatures}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {80--97}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_6}, doi = {10.1007/3-540-36563-X\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GalbraithM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BlackburnCG03, author = {Simon R. Blackburn and Carlos Cid and Steven D. Galbraith}, title = {Cryptanalysis of a Cryptosystem based on Drinfeld modules}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {223}, year = {2003}, url = {http://eprint.iacr.org/2003/223}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BlackburnCG03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/GalbraithMS02, author = {Steven D. Galbraith and John Malone{-}Lee and Nigel P. Smart}, title = {Public key signatures in the multi-user setting}, journal = {Inf. Process. Lett.}, volume = {83}, number = {5}, pages = {263--266}, year = {2002}, url = {https://doi.org/10.1016/S0020-0190(01)00338-6}, doi = {10.1016/S0020-0190(01)00338-6}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/GalbraithMS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Galbraith02, author = {Steven D. Galbraith}, title = {Elliptic Curve Paillier Schemes}, journal = {J. Cryptol.}, volume = {15}, number = {2}, pages = {129--138}, year = {2002}, url = {https://doi.org/10.1007/s00145-001-0015-6}, doi = {10.1007/S00145-001-0015-6}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/Galbraith02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/moc/GalbraithPS02, author = {Steven D. Galbraith and Sachar M. Paulus and Nigel P. Smart}, title = {Arithmetic on superelliptic curves}, journal = {Math. Comput.}, volume = {71}, number = {237}, pages = {393--405}, year = {2002}, url = {https://doi.org/10.1090/S0025-5718-00-01297-7}, doi = {10.1090/S0025-5718-00-01297-7}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/moc/GalbraithPS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ants/GalbraithHS02, author = {Steven D. Galbraith and Keith Harrison and David Soldera}, editor = {Claus Fieker and David R. Kohel}, title = {Implementing the Tate Pairing}, booktitle = {Algorithmic Number Theory, 5th International Symposium, ANTS-V, Sydney, Australia, July 7-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2369}, pages = {324--337}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45455-1\_26}, doi = {10.1007/3-540-45455-1\_26}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ants/GalbraithHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/GalbraithMP02, author = {Steven D. Galbraith and Wenbo Mao and Kenneth G. Paterson}, editor = {Bart Preneel}, title = {RSA-Based Undeniable Signatures for General Moduli}, booktitle = {Topics in Cryptology - {CT-RSA} 2002, The Cryptographer's Track at the {RSA} Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2271}, pages = {200--217}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45760-7\_14}, doi = {10.1007/3-540-45760-7\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/GalbraithMP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/GalbraithHS02, author = {Steven D. Galbraith and Florian Hess and Nigel P. Smart}, editor = {Lars R. Knudsen}, title = {Extending the {GHS} Weil Descent Attack}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2332}, pages = {29--44}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-46035-7\_3}, doi = {10.1007/3-540-46035-7\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/GalbraithHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHS02, author = {Steven D. Galbraith and Herbie J. Hopkins and Igor E. Shparlinski}, title = {Secure Bilinear Diffie-Hellman Bits}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {155}, year = {2002}, url = {http://eprint.iacr.org/2002/155}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/endm/Galbraith01, author = {Steven D. Galbraith}, title = {Weil Descent Of Jacobians}, journal = {Electron. Notes Discret. Math.}, volume = {6}, pages = {459--468}, year = {2001}, url = {https://doi.org/10.1016/S1571-0653(04)00198-2}, doi = {10.1016/S1571-0653(04)00198-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/endm/Galbraith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Galbraith01, author = {Steven D. Galbraith}, editor = {Colin Boyd}, title = {Supersingular Curves in Cryptography}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2248}, pages = {495--513}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45682-1\_29}, doi = {10.1007/3-540-45682-1\_29}, timestamp = {Tue, 01 Jun 2021 15:22:33 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Galbraith01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Galbraith01a, author = {Steven D. Galbraith}, title = {Elliptic curve Paillier schemes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {50}, year = {2001}, url = {http://eprint.iacr.org/2001/050}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Galbraith01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GalbraithHS01, author = {Steven D. Galbraith and Florian Hess and Nigel P. Smart}, title = {Extending the {GHS} Weil Descent Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {54}, year = {2001}, url = {http://eprint.iacr.org/2001/054}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GalbraithHS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/em/Galbraith99, author = {Steven D. Galbraith}, title = {Rational Points on X\({}_{\mbox{O}}\) \({}^{\mbox{+}}\)(p)}, journal = {Exp. Math.}, volume = {8}, number = {4}, pages = {311--318}, year = {1999}, url = {https://doi.org/10.1080/10586458.1999.10504621}, doi = {10.1080/10586458.1999.10504621}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/em/Galbraith99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/lmsjcm/Galbraith99, author = {Steven D. Galbraith}, title = {Constructing Isogenies between Elliptic Curves Over Finite Fields}, journal = {{LMS} J. Comput. Math.}, volume = {2}, pages = {118--138}, year = {1999}, url = {https://doi.org/10.1112/s1461157000000097}, doi = {10.1112/S1461157000000097}, timestamp = {Fri, 05 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/lmsjcm/Galbraith99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BlackburnG99, author = {Simon R. Blackburn and Steven D. Galbraith}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Cryptanalysis of Two Cryptosystems Based on Group Actions}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {52--61}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_6}, doi = {10.1007/978-3-540-48000-6\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BlackburnG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/GalbraithS99, author = {Steven D. Galbraith and Nigel P. Smart}, editor = {Michael Walker}, title = {A Cryptographic Application of Weil Descent}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {191--200}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_23}, doi = {10.1007/3-540-46665-7\_23}, timestamp = {Wed, 18 Mar 2020 16:00:59 +0100}, biburl = {https://dblp.org/rec/conf/ima/GalbraithS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/BlackburnBBG99, author = {Simon R. Blackburn and Simon Blake{-}Wilson and Mike Burmester and Steven D. Galbraith}, editor = {Michael Walker}, title = {Weaknesses in Shared {RSA} Key Generation Protocols}, booktitle = {Cryptography and Coding, 7th {IMA} International Conference, Cirencester, UK, December 20-22, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1746}, pages = {300--306}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-46665-7\_34}, doi = {10.1007/3-540-46665-7\_34}, timestamp = {Wed, 18 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ima/BlackburnBBG99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.