David Jao

Orcid: 0000-0002-8073-1692

According to our database1, David Jao authored at least 58 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Commuting Ramanujan Graphs and the Random Self-reducibility of Isogeny Problems.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

2024
On the Semidirect Discrete Logarithm Problem in Finite Groups.
IACR Cryptol. ePrint Arch., 2024

Isogeny Interpolation and the Computation of Isogenies from Higher Dimensional Representations.
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024

On the Semidirect Discrete Logarithm Problem in Finite Groups.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Generating Supersingular Elliptic Curves over 픽<sub>p</sub> with Unknown Endomorphism Ring.
IACR Cryptol. ePrint Arch., 2023

Zero-Knowledge Proofs for SIDH Variants with Masked Degree or Torsion.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2023

Generating Supersingular Elliptic Curves over $\mathbb {F}_p$ with Unknown Endomorphism Ring.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Optimal Generic Attack Against Basic Boneh-Boyen Signatures.
Proceedings of the Information Security Practice and Experience, 2022

2021
Towards Isogeny-Based Password-Authenticated Key Establishment.
J. Math. Cryptol., 2021

x-only point addition formula and faster compressed SIKE.
J. Cryptogr. Eng., 2021

Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
New Techniques for SIDH-based NIKE.
J. Math. Cryptol., 2020

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action.
J. Math. Cryptol., 2020

x-only point addition formula and faster torsion basis generation in compressed SIKE.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies.
IACR Cryptol. ePrint Arch., 2020

How Not to Create an Isogeny-Based PAKE.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM.
IEEE Trans. Dependable Secur. Comput., 2019

ARMv8 SIKE: Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors.
IACR Cryptol. ePrint Arch., 2019

Practical Supersingular Isogeny Group Key Agreement.
IACR Cryptol. ePrint Arch., 2019

Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.
Proceedings of the Information Security Practice and Experience, 2019

Towards Optimized and Constant-Time CSIDH on Embedded Devices.
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2019

2018
An Isogeny-Based Password-Authenticated Key Establishment Protocol.
IACR Cryptol. ePrint Arch., 2018

Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol.
IACR Cryptol. ePrint Arch., 2018

EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

SoK: The Problem Landscape of SIDH.
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018

2017
Fast Software Implementations of Bilinear Pairings.
IEEE Trans. Dependable Secur. Comput., 2017

Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies.
Proceedings of the Financial Cryptography and Data Security, 2017

Efficient Compression of SIDH Public Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

2016
NEON-SIDH: Effi cient Implementation of Supersingular Isogeny Diffi e-Hellman Key-Exchange Protocol on ARM.
IACR Cryptol. ePrint Arch., 2016

Post-Quantum Security Models for Authenticated Encryption.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

On Fast Calculation of Addition Chains for Isogeny-Based Cryptography.
Proceedings of the Information Security and Cryptology - 12th International Conference, 2016

Key Compression for Isogeny-Based Cryptosystems.
Proceedings of the 3rd ACM International Workshop on ASIA Public-Key Cryptography, 2016

NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Common Subexpression Algorithms for Space-Complexity Reduction of Gaussian Normal Basis Multiplication.
IEEE Trans. Inf. Theory, 2015

2014
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.
J. Math. Cryptol., 2014

Constructing elliptic curve isogenies in quantum subexponential time.
J. Math. Cryptol., 2014

Isogeny-Based Quantum-Resistant Undeniable Signatures.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2012
Efficient Implementation of Bilinear Pairings on ARM Processors.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

2011
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Publicly Verifiable Secret Sharing for Cloud-Based Key Management.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Elliptic Curve Cryptography.
Proceedings of the Handbook of Information and Communication Security, 2010

A Subexponential Algorithm for Evaluating Large Degree Isogenies.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

2009
Boneh-Boyen Signatures and the Strong Diffie-Hellman Problem.
Proceedings of the Pairing-Based Cryptography, 2009

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols.
Proceedings of the Progress in Cryptology, 2009

2008
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Proceedings of the Pairing-Based Cryptography, 2008

2007
Digit Set Randomization in Elliptic Curve Cryptography.
Proceedings of the Stochastic Algorithms: Foundations and Applications, 2007

On the Bits of Elliptic Curve Diffie-Hellman Keys.
Proceedings of the Progress in Cryptology, 2007

2005
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
Proceedings of the Advances in Cryptology, 2005

2004
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves.
IACR Cryptol. ePrint Arch., 2004


  Loading...