David Jao

Orcid: 0000-0002-8073-1692

According to our database1, David Jao authored at least 54 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Zero-Knowledge Proofs for SIDH variants with Masked Degree or Torsion.
IACR Cryptol. ePrint Arch., 2024

2023
Generating Supersingular Elliptic Curves over 픽<sub>p</sub> with Unknown Endomorphism Ring.
IACR Cryptol. ePrint Arch., 2023

Generating Supersingular Elliptic Curves over $\mathbb {F}_p$ with Unknown Endomorphism Ring.
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023

2022
Optimal Generic Attack Against Basic Boneh-Boyen Signatures.
Proceedings of the Information Security Practice and Experience, 2022

2021
Towards Isogeny-Based Password-Authenticated Key Establishment.
J. Math. Cryptol., 2021

x-only point addition formula and faster compressed SIKE.
J. Cryptogr. Eng., 2021

Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
New Techniques for SIDH-based NIKE.
J. Math. Cryptol., 2020

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action.
J. Math. Cryptol., 2020

x-only point addition formula and faster torsion basis generation in compressed SIKE.
IACR Cryptol. ePrint Arch., 2020

Towards Post-Quantum Updatable Public-Key Encryption via Supersingular Isogenies.
IACR Cryptol. ePrint Arch., 2020

How Not to Create an Isogeny-Based PAKE.
IACR Cryptol. ePrint Arch., 2020

2019
Supersingular Isogeny Diffie-Hellman Key Exchange on 64-Bit ARM.
IEEE Trans. Dependable Secur. Comput., 2019

ARMv8 SIKE: Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors.
IEEE Trans. Circuits Syst. I Regul. Pap., 2019

Towards Optimized and Constant-Time CSIDH on Embedded Devices.
IACR Cryptol. ePrint Arch., 2019

Optimized Supersingular Isogeny Key Encapsulation on ARMv8 Processors.
IACR Cryptol. ePrint Arch., 2019

Practical Supersingular Isogeny Group Key Agreement.
IACR Cryptol. ePrint Arch., 2019

Improved Digital Signatures Based on Elliptic Curve Endomorphism Rings.
Proceedings of the Information Security Practice and Experience, 2019

2018
SoK: The Problem Landscape of SIDH.
IACR Cryptol. ePrint Arch., 2018

An Isogeny-Based Password-Authenticated Key Establishment Protocol.
IACR Cryptol. ePrint Arch., 2018

Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol.
IACR Cryptol. ePrint Arch., 2018

EdSIDH: Supersingular Isogeny Diffie-Hellman Key Exchange on Edwards Curves.
Proceedings of the Security, Privacy, and Applied Cryptography Engineering, 2018

An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
Fast Software Implementations of Bilinear Pairings.
IEEE Trans. Dependable Secur. Comput., 2017

Post-Quantum Cryptography on FPGA Based on Isogenies on Elliptic Curves.
IEEE Trans. Circuits Syst. I Regul. Pap., 2017

A Post-Quantum Digital Signature Scheme Based on Supersingular Isogenies.
IACR Cryptol. ePrint Arch., 2017

Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

2016
On Fast Calculation of Addition Chains for Isogeny-Based Cryptography.
IACR Cryptol. ePrint Arch., 2016

Efficient compression of SIDH public keys.
IACR Cryptol. ePrint Arch., 2016

NEON-SIDH: Effi cient Implementation of Supersingular Isogeny Diffi e-Hellman Key-Exchange Protocol on ARM.
IACR Cryptol. ePrint Arch., 2016

Key Compression for Isogeny-Based Cryptosystems.
IACR Cryptol. ePrint Arch., 2016

Post-Quantum Security Models for Authenticated Encryption.
Proceedings of the Post-Quantum Cryptography - 7th International Workshop, 2016

NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Common Subexpression Algorithms for Space-Complexity Reduction of Gaussian Normal Basis Multiplication.
IEEE Trans. Inf. Theory, 2015

2014
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.
J. Math. Cryptol., 2014

Constructing elliptic curve isogenies in quantum subexponential time.
J. Math. Cryptol., 2014

Isogeny-Based Quantum-Resistant Undeniable Signatures.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

A Quantum Algorithm for Computing Isogenies between Supersingular Elliptic Curves.
Proceedings of the Progress in Cryptology - INDOCRYPT 2014, 2014

2012
Efficient Implementation of Bilinear Pairings on ARM Processors.
IACR Cryptol. ePrint Arch., 2012

2011
Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies.
IACR Cryptol. ePrint Arch., 2011

Publicly Verifiable Secret Sharing for Cloud-Based Key Management.
Proceedings of the Progress in Cryptology - INDOCRYPT 2011, 2011

2010
Elliptic Curve Cryptography.
Proceedings of the Handbook of Information and Communication Security, 2010

A Subexponential Algorithm for Evaluating Large Degree Isogenies.
Proceedings of the Algorithmic Number Theory, 9th International Symposium, 2010

2009
Boneh-Boyen signatures and the Strong Diffie-Hellman problem.
IACR Cryptol. ePrint Arch., 2009

A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols.
Proceedings of the Progress in Cryptology, 2009

2008
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms.
Proceedings of the Pairing-Based Cryptography, 2008

2007
Digit Set Randomization in Elliptic Curve Cryptography.
Proceedings of the Stochastic Algorithms: Foundations and Applications, 2007

On the Bits of Elliptic Curve Diffie-Hellman Keys.
Proceedings of the Progress in Cryptology, 2007

2005
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
Proceedings of the Advances in Cryptology, 2005

2004
Ramanujan Graphs and the Random Reducibility of Discrete Log on Isogenous Elliptic Curves.
IACR Cryptol. ePrint Arch., 2004


  Loading...