David Jao
David Jao
Verified email at uwaterloo.ca - Homepage
Title
Cited by
Cited by
Year
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
D Jao, L De Feo
International Workshop on Post-Quantum Cryptography, 19-34, 2011
3032011
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies
L De Feo, D Jao, J Plūt
Journal of Mathematical Cryptology 8 (3), 209-247, 2014
2542014
Constructing elliptic curve isogenies in quantum subexponential time
A Childs, D Jao, V Soukharev
Journal of Mathematical Cryptology 8 (1), 1-29, 2014
1872014
A post-quantum digital signature scheme based on supersingular isogenies
Y Yoo, R Azarderakhsh, A Jalali, D Jao, V Soukharev
International Conference on Financial Cryptography and Data Security, 163-181, 2017
852017
Post-quantum cryptography on FPGA based on isogenies on elliptic curves
B Koziel, R Azarderakhsh, MM Kermani, D Jao
IEEE Transactions on Circuits and Systems I: Regular Papers 64 (1), 86-99, 2016
782016
Efficient compression of SIDH public keys
C Costello, D Jao, P Longa, M Naehrig, J Renes, D Urbanik
Annual International Conference on the Theory and Applications of …, 2017
762017
A quantum algorithm for computing isogenies between supersingular elliptic curves
JF Biasse, D Jao, A Sankar
International Conference on Cryptology in India, 428-442, 2014
762014
Supersingular isogeny key encapsulation
R Azarderakhsh, M Campagna, C Costello, LD Feo, B Hess, A Jalali, ...
Submission to the NIST Post-Quantum Standardization project, 2017
642017
Isogeny-based quantum-resistant undeniable signatures
D Jao, V Soukharev
International Workshop on Post-Quantum Cryptography, 160-179, 2014
642014
Key compression for isogeny-based cryptosystems
R Azarderakhsh, D Jao, K Kalach, B Koziel, C Leonardi
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key …, 2016
622016
A study of two-party certificateless authenticated key-agreement protocols
C Swanson, D Jao
International Conference on Cryptology in India, 57-71, 2009
622009
Do all elliptic curves of the same order have the same difficulty of discrete log?
D Jao, SD Miller, R Venkatesan
International Conference on the Theory and Application of Cryptology and …, 2005
562005
Privacy-preserving data aggregation using homomorphic encryption
JH Wang, Q Huang, D Jao
US Patent 7,856,100, 2010
552010
Expander graphs based on GRH with an application to elliptic curve cryptography
D Jao, SD Miller, R Venkatesan
Journal of Number Theory 129 (6), 1491-1504, 2009
512009
NEON-SIDH: efficient implementation of supersingular isogeny Diffie-Hellman key exchange protocol on ARM
B Koziel, A Jalali, R Azarderakhsh, D Jao, M Mozaffari-Kermani
International Conference on Cryptology and Network Security, 88-103, 2016
502016
Efficient implementation of bilinear pairings on ARM processors
G Grewal, R Azarderakhsh, P Longa, S Hu, D Jao
International Conference on Selected Areas in Cryptography, 149-165, 2012
502012
Boneh-Boyen signatures and the strong Diffie-Hellman problem
D Jao, K Yoshida
International Conference on Pairing-Based Cryptography, 1-16, 2009
422009
Efficient implementations of a quantum-resistant key-exchange protocol on embedded systems
R Azarderakhsh, D Fishbein, D Jao
Center of Applied Cryptographic Research (CACR), Waterloo, Canada, Tech. Rep …, 2014
292014
A subexponential algorithm for evaluating large degree isogenies
D Jao, V Soukharev
International Algorithmic Number Theory Symposium, 219-233, 2010
292010
Publicly verifiable secret sharing for cloud-based key management
R D’Souza, D Jao, I Mironov, O Pandey
International Conference on Cryptology in India, 290-309, 2011
262011
The system can't perform the operation now. Try again later.
Articles 1–20