Jesús-Javier Chi-Domínguez

Orcid: 0000-0002-9753-7263

According to our database1, Jesús-Javier Chi-Domínguez authored at least 34 papers between 2015 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
RYDE: a digital signature scheme based on rank syndrome decoding problem with MPC-in-the-Head paradigm.
Des. Codes Cryptogr., May, 2025

Let us walk on the 3-isogeny graph: efficient, fast, and simple.
IACR Cryptol. ePrint Arch., 2025

Weak Instances of the Inverse Matrix Code Equivalence Problem.
IACR Cryptol. ePrint Arch., 2025

Improved Subfield Curve Search For Specific Field Characteristics.
IACR Cryptol. ePrint Arch., 2025

Don't Use It Twice: Reloaded! On the Lattice Isomorphism Group Action.
IACR Commun. Cryptol., 2025

2024
Don't Use It Twice! Solving Relaxed Linear Code Equivalence Problems.
IACR Cryptol. ePrint Arch., 2024

Optimizations and Practicality of High-Security CSIDH.
IACR Commun. Cryptol., 2024

Properties of Lattice Isomorphism as a Cryptographic Group Action.
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024

Don't Use it Twice! Solving Relaxed Linear Equivalence Problems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
Karatsuba-based square-root Vélu's formulas applied to two isogeny-based protocols.
J. Cryptogr. Eng., April, 2023

Computing Quotient Groups of Smooth Order with Applications to Isogenies over Higher-Dimensional Abelian Varieties.
IACR Cryptol. ePrint Arch., 2023

On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH.
IACR Cryptol. ePrint Arch., 2023

Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms.
IACR Cryptol. ePrint Arch., 2023

RYDE: A Digital Signature Scheme based on Rank-Syndrome-Decoding Problem with MPCitH Paradigm.
CoRR, 2023

MIRA: a Digital Signature Scheme based on the MinRank problem and the MPC-in-the-Head paradigm.
CoRR, 2023

Low Memory Attacks on Small Key CSIDH.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents.
J. Cryptogr. Eng., 2022

SIDH-sign: an efficient SIDH PoK-based signature.
IACR Cryptol. ePrint Arch., 2022

Applying Castryck-Decru Attack on the Masked Torsion Point Images SIDH variant.
IACR Cryptol. ePrint Arch., 2022

A Note on Constructing SIDH-PoK-based Signatures after Castryck-Decru Attack.
IACR Cryptol. ePrint Arch., 2022

Faulty isogenies: a new kind of leakage.
IACR Cryptol. ePrint Arch., 2022

Optimal strategies for CSIDH.
Adv. Math. Commun., 2022

Parallel Isogeny Path Finding with Limited Memory.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Fully Projective Radical Isogenies in Constant-Time.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Don't forget the constant-time in CSURF.
IACR Cryptol. ePrint Arch., 2021

Extending the GLS endomorphism to speed up GHS Weil descent using Magma.
Finite Fields Their Appl., 2021

A Formula for Disaster: A Unified Approach to Elliptic Curve Special-Point-Based Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
The SQALE of CSIDH: Square-root vélu Quantum-resistant isogeny Action with Low Exponents.
IACR Cryptol. ePrint Arch., 2020

On new Vélu's formulae and their applications to CSIDH and B-SIDH constant-time implementations.
IACR Cryptol. ePrint Arch., 2020

Déjà Vu: Side-Channel Analysis of Mozilla's NSS.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

Set It and Forget It! Turnkey ECC for Instant Integration.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Stronger and Faster Side-Channel Protections for CSIDH.
Proceedings of the Progress in Cryptology - LATINCRYPT 2019, 2019

2018
On the Cost of Computing Isogenies Between Supersingular Elliptic Curves.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

2015
Attacking a Binary GLS Elliptic Curve with Magma.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015


  Loading...