Jason T. LeGrow

Orcid: 0000-0002-6239-6616

According to our database1, Jason T. LeGrow authored at least 20 papers between 2016 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

A faster method for fault attack resistance in static/ephemeral CSIDH.
J. Cryptogr. Eng., September, 2023

CSI-Otter: Isogeny-based (Partially) Blind Signatures from the Class Group Action with a Twist.
IACR Cryptol. ePrint Arch., 2023

Influences of some families of error-correcting codes.
CoRR, 2023

Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

2022
Supersingular Non-Superspecial Abelian Surfaces in Cryptography.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

2021
Towards Isogeny-Based Password-Authenticated Key Establishment.
J. Math. Cryptol., 2021

Cryptanalysis of 'MAKE'.
IACR Cryptol. ePrint Arch., 2021

(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.
Proceedings of the Advances in Information and Computer Security, 2021

2020
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols.
PhD thesis, 2020

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action.
J. Math. Cryptol., 2020

An adaptive attack on 2-SIDH.
Int. J. Comput. Math. Comput. Syst. Theory, 2020

An Analysis of Fault Attacks on CSIDH.
IACR Cryptol. ePrint Arch., 2020

How Not to Create an Isogeny-Based PAKE.
IACR Cryptol. ePrint Arch., 2020

2019
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors.
IACR Cryptol. ePrint Arch., 2019

Extending the Adaptive Attack to 2-SIDH.
IACR Cryptol. ePrint Arch., 2019

2018
An Isogeny-Based Password-Authenticated Key Establishment Protocol.
IACR Cryptol. ePrint Arch., 2018

Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol.
IACR Cryptol. ePrint Arch., 2018

2016
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs.
Des. Codes Cryptogr., 2016


  Loading...