Craig Costello

Orcid: 0000-0001-5423-7714

According to our database1, Craig Costello authored at least 48 papers between 2009 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient algorithms for the detection of (N,N)-splittings and endomorphisms.
IACR Cryptol. ePrint Arch., 2025

On pairs of primes with small order reciprocity.
IACR Cryptol. ePrint Arch., 2025

2024
Efficient (3,3)-isogenies on fast Kummer surfaces.
IACR Cryptol. ePrint Arch., 2024

Lollipops of pairing-friendly elliptic curves for composition of proof systems.
IACR Cryptol. ePrint Arch., 2024

Efficient (3, 3)-isogenies on fast Kummer surfaces.
CoRR, 2024

An Algorithm for Efficient Detection of (N, N)-Splittings and Its Application to the Isogeny Problem in Dimension 2.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

On Cycles of Pairing-Friendly Abelian Varieties.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024

2023
Cryptographic Smooth Neighbors.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Accelerating the Delfs-Galbraith Algorithm with Fast Subfield Root Detection.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022

2021
SuperSolver: accelerating the Delfs-Galbraith algorithm with fast subfield root detection.
IACR Cryptol. ePrint Arch., 2021

The Case for SIKE: A Decade of the Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2021

Sieving for Twin Smooth Integers with Solutions to the Prouhet-Tarry-Escott Problem.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
The Supersingular Isogeny Problem in Genus 2 and Beyond.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Improved Classical Cryptanalysis of SIKE in Practice.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2019

Supersingular Isogeny Key Exchange for Beginners.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

2018
Montgomery curves and their arithmetic - The case of large characteristic fields.
J. Cryptogr. Eng., 2018

Computing Supersingular Isogenies on Kummer Surfaces.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Montgomery curves and their arithmetic.
CoRR, 2017

Efficient Compression of SIDH Public Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

A Simple and Compact Algorithm for SIDH with Arbitrary Degree Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Selecting elliptic curves for cryptography: an efficiency and security analysis.
J. Cryptogr. Eng., 2016

Fast, Uniform Scalar Multiplication for Genus 2 Jacobians with Fast Kummers.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Complete Addition Formulas for Prime Order Elliptic Curves.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Frodo: Take off the Ring! Practical, Quantum-Secure Key Exchange from LWE.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Fast, uniform, and compact scalar multiplication for elliptic curves and genus 2 Jacobians with applications to signature schemes.
IACR Cryptol. ePrint Arch., 2015

Geppetto: Versatile Verifiable Computation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Post-Quantum Key Exchange for the TLS Protocol from the Ring Learning with Errors Problem.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Subgroup Security in Pairing-Based Cryptography.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Constructing abelian surfaces for cryptography via Rosenhain invariants.
LMS J. Comput. Math., 2014

Elliptic and Hyperelliptic Curves: A Practical Security Analysis.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Faster Compact Diffie-Hellman: Endomorphisms on the x-line.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Jacobian Coordinates on Genus 2 Curves.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Exponentiating in Pairing Groups.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

Fast Cryptography in Genus 2.
Proceedings of the Advances in Cryptology, 2013

High-Performance Scalar Multiplication Using 8-Dimensional GLV/GLS Decomposition.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2013, 2013

2012
Particularly Friendly Members of Family Trees.
IACR Cryptol. ePrint Arch., 2012

Two is Greater than One.
IACR Cryptol. ePrint Arch., 2012

2011
Group Law Computations on Jacobians of Hyperelliptic Curves.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Attractive Subfamilies of BLS Curves for Implementing High-Security Pairings.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Delaying Mismatched Field Multiplications in Pairing Computations.
Proceedings of the Arithmetic of Finite Fields, Third International Workshop, 2010

Faster Pairing Computations on Curves with High-Degree Twists.
Proceedings of the Public Key Cryptography, 2010

Fixed Argument Pairings.
Proceedings of the Progress in Cryptology, 2010

Avoiding Full Extension Field Arithmetic in Pairing Computations.
Proceedings of the Progress in Cryptology, 2010

2009
Faster Pairings on Special Weierstrass Curves.
Proceedings of the Pairing-Based Cryptography, 2009


  Loading...