Andrea Basso

Orcid: 0000-0002-3270-1069

Affiliations:
  • University of Bristol, UK
  • University of Birmingham, UK (PhD)


According to our database1, Andrea Basso authored at least 20 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Using Learning with Rounding to Instantiate Post-Quantum Cryptographic Algorithms.
IACR Cryptol. ePrint Arch., 2025

PRISM: Simple and Compact Identification and Signatures from Large Prime Degree Isogenies.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

POKÉ: A Compact and Efficient PKE from Higher-Dimensional Isogenies.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

A Complete Security Proof of SQIsign.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
POKE: A Framework for Efficient PKEs, Split KEMs, and OPRFs from Higher-dimensional Isogenies.
IACR Cryptol. ePrint Arch., 2024

SQIsign2D-West - The Fast, the Small, and the Safer.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

Exploring SIDH-Based Signature Parameters.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
High-speed SABER key encapsulation mechanism in 65nm CMOS.
J. Cryptogr. Eng., November, 2023

Kavach: Lightweight masking techniques for polynomial arithmetic in lattice-based cryptography.
IACR Cryptol. ePrint Arch., 2023

A Post-Quantum Round-Optimal Oblivious PRF from Isogenies.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

Supersingular Curves You Can Trust.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

FESTA: Fast Encryption from Supersingular Torsion Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

New SIDH Countermeasures for a More Efficient Key Exchange.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
On the supersingular GPST attack.
J. Math. Cryptol., 2022

Poster: A Post-Quantum Oblivious PRF from Isogenies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Optimized Polynomial Multiplier Architectures for Post-Quantum KEM Saber.
Proceedings of the 58th ACM/IEEE Design Automation Conference, 2021

Design Space Exploration of SABER in 65nm ASIC.
Proceedings of the ASHES@CCS 2021: Proceedings of the 5th Workshop on Attacks and Solutions in Hardware Security, 2021

Cryptanalysis of an Oblivious PRF from Supersingular Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
High-speed Instruction-set Coprocessor for Lattice-based Key Encapsulation Mechanism: Saber in Hardware.
IACR Cryptol. ePrint Arch., 2020

On Adaptive Attacks Against Jao-Urbanik's Isogeny-Based Protocol.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2020, 2020


  Loading...