publications
publications by category. generated by jekyll-scholar.
Miscellaneous
2024
- LESS2024Additional Digital Signature Schemes - Round 2 Submissions. NIST standardization process of Post-Quantum Cryptography
2023
- Anonymity preserving data collection using homomorphic encryption2023Patent Nb. US 11,809,597 B2
2020
- Trace-\(Σ\): a privacy-preserving contact tracing app2020IACR Cryptol. ePrint Arch.
Preprints
2025
- An efficient quantum algorithm for computing S-units and its applications2025\urlhttps://eprint.iacr.org/2025/1797
- PAKEM and PAHE: How to Use Password for One Shot Secure Communication2025
- A search to decision reduction for the linear code equivalence problem2025
Peer-reviewed publications
2025
- Faster SCALLOP from Non-prime Conductor Suborders in Medium Sized Quadratic FieldsIn Public-Key Cryptography - PKC 2025 - 28th IACR International Conference on Practice and Theory of Public-Key Cryptography, Røros, Norway, May 12-15, 2025, Proceedings, Part III, 2025
- Asymptotic improvements to provable algorithms for the code equivalence problem (extended abstract)IEEE International Symposium on Information Theory, ISIT 2025, Ann Arbor, MI, USA, June 22-27, 2025, 2025
- Asymptotic improvements to provable algorithms for the code equivalence problemIEEE Transactions in Information Theory, 2025
-
2024
2023
- A Search-to-Decision Reduction for the Permutation Code Equivalence ProblemIn IEEE International Symposium on Information Theory, ISIT 2023, Taipei, Taiwan, June 25-30, 2023, 2023
- On the computational hardness of the code equivalence problem in cryptographyAdv. Math. Commun., 2023
- A proof of the conjectured run time of the Hafner-McCurley class group algorithmAdv. Math. Commun., 2023
- Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptographyIET Inf. Secur., 2023
2022
- Norm relations and computational problems in number fieldsJournal of the London Mathematical Society, 2022
- Advanced signature functionalities from the code equivalence problemInt. J. Comput. Math. Comput. Syst. Theory, 2022
- Mildly Short Vectors in Ideal Lattices of Certain Families of Cyclotomic Fields Without Quantum Computers.Mathematical Cryptology, 2022
2021
- LESS-FM: Fine-Tuning Signatures from the Code Equivalence ProblemIn Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings, 2021
- A trade-off between classical and quantum circuit size for an attack against CSIDHJ. Math. Cryptol., 2021
- A framework for reducing the overhead of the quantum oracle for use with Grover’s algorithm with applications to cryptanalysis of SIKEJ. Math. Cryptol., 2021
- Parallelism strategies for the tuneable golden-claw finding problemInt. J. Comput. Math. Comput. Syst. Theory, 2021
2020
- LESS is More: Code-Based Signatures Without SyndromesIn Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Cairo, Egypt, July 20-22, 2020, Proceedings, 2020
2019
- Improved techniques for computing the ideal class group and a system of fundamental units in number fields.In Algorithmic Number Theory, 13th International Symposium, ANTS-XIII, Madison WI, USA, July 16-20, 2018. Proceedings, 2019
- On the quantum attacks against schemes relying on the hardness of finding a short generator of an ideal in Q(\zeta_2^n)Journal of Mathematical Cryptology, 2019
2018
- A Note on the Security of CSIDHIn Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings, 2018
2017
- Computing Generator in Cyclotomic Integer Rings - A Subfield Algorithm for the Principal Ideal Problem in L_\Delta_K(1/2) and Application to the Cryptanalysis of a FHE SchemeIn Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 - May 4, 2017, Proceedings, Part I, 2017
- A Low-Resource Quantum Factoring AlgorithmIn Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings, 2017
- Approximate Short Vectors in Ideal Lattices of Q(\zeta_p^ e) with Precomputation of Cl(O_K)In Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers, 2017
- On the computation of the HNF of a module over the ring of integers of a number fieldJ. Symb. Comput., 2017
2016
- Efficient quantum algorithms for computing class groups and solving the principal ideal problem in arbitrary degree number fieldsIn Proceedings of the Twenty-Seventh Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2016, Arlington, VA, USA, January 10-12, 2016, 2016
- Fast heuristic algorithms for computing relations in the class group of a quadratic order, with applications to isogeny evaluationLMS Journal of Computation and Mathematics, 2016
2015
- FHEW with Efficient Multibit BootstrappingIn Progress in Cryptology - LATINCRYPT 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings, 2015
2014
- A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic CurvesIn Progress in Cryptology - INDOCRYPT 2014 - 15th International Conference on Cryptology in India, New Delhi, India, December 14-17, 2014, Proceedings, 2014
- An L(1/3) algorithm for ideal class group and regulator computation in certain number fields.Math. Comp., 2014
- Subexponential class group and unit group computation in large degree number fieldsLMS Journal of Computation and Mathematics, Jan 2014
- Smoothness testing of polynomials over finite fieldsAdvances in Mathematics of Communications, Jan 2014
- Subexponential time relations in the class group of large degree number fieldsAdvances in Mathematics of Communications, Jan 2014
2012
- A polynomial time algorithm for computing the HNF of a module over the integers of a number field.In International Symposium on Symbolic and Algebraic Computation, ISSAC’12, Grenoble, France - July 22 - 25, 2012, Jan 2012
- An algorithm for list decoding number field codes.In Proceedings of the 2012 IEEE International Symposium on Information Theory, ISIT 2012, Cambridge, MA, USA, July 1-6, 2012, Jan 2012
- Improved techniques for computing the ideal class group and a system of fundamental units in number fields.In Algorithmic Number Theory, 10th International Symposium, ANTS-IX, San Diego CA, USA, July 9-13, 2012. Proceedings, Jan 2012
2010
- Security Estimates for Quadratic Field Based Cryptosystems.In Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, Jan 2010
- Practical Improvements to Class Group and Regulator Computation of Real Quadratic Fields.In Algorithmic Number Theory, 9th International Symposium, ANTS-IX, Nancy, France, July 19-23, 2010. Proceedings, Jan 2010
- Algebraic techniques for number fields.In 2nd International Conference on Symbolic Computation and Cryptography , SCC 2010, Egham, UK. Proceedings, Jan 2010
- Improvements in the computation of ideal class groups of imaginary quadratic number fields.Adv. in Math. of Comm., Jan 2010
2006
- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.In Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, Jan 2006