Patrick Longa

Orcid: 0000-0001-5791-6341

According to our database1, Patrick Longa authored at least 46 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
FrodoKEM: A CCA-Secure Learning With Errors Key Encapsulation Mechanism.
IACR Commun. Cryptol., 2025

2023
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

New Algorithms for the Deuring Correspondence - Towards Practical and Secure SQISign Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Efficient Algorithms for Large Prime Characteristic Fields and Their Application to Bilinear Pairings and Supersingular Isogeny-Based Protocols.
IACR Cryptol. ePrint Arch., 2022

2021
The Cost to Break SIKE: A Comparative Hardware-Based Analysis with AES and SHA-3.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

2020
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020

A Compact and Scalable Hardware/Software Co-design of SIKE.
IACR Cryptol. ePrint Arch., 2020

Parameterized Hardware Accelerators for Lattice-Based Cryptography and Their Application to the HW/SW Co-Design of qTESLA.
IACR Cryptol. ePrint Arch., 2020

Improved Classical Cryptanalysis of SIKE in Practice.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

The Lattice-Based Digital Signature Scheme qTESLA.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem.
IACR Cryptol. ePrint Arch., 2019

2018
Guest Editors' Introduction to the Special Issue on Cryptographic Engineering in a Post-Quantum World: State of the Art Advances.
IEEE Trans. Computers, 2018

SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Cryptol. ePrint Arch., 2018

A Note on Post-Quantum Authenticated Key Exchange from Supersingular Isogenies.
IACR Cryptol. ePrint Arch., 2018

2017
Fast Software Implementations of Bilinear Pairings.
IEEE Trans. Dependable Secur. Comput., 2017

FourQ on embedded devices with strong countermeasures against side-channel attacks.
IACR Cryptol. ePrint Arch., 2017

Efficient Compression of SIDH Public Keys.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Selecting elliptic curves for cryptography: an efficiency and security analysis.
J. Cryptogr. Eng., 2016

FourQ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields.
IACR Cryptol. ePrint Arch., 2016

Sharper Ring-LWE Signatures.
IACR Cryptol. ePrint Arch., 2016

FourQNEON: Faster Elliptic Curve Scalar Multiplications on ARM Processors.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Efficient Algorithms for Supersingular Isogeny Diffie-Hellman.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Four ℚ on FPGA: New Hardware Speed Records for Elliptic Curve Cryptography over Large Prime Characteristic Fields.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2016, 2016

Speeding up the Number Theoretic Transform for Faster Ideal Lattice-Based Cryptography.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Efficient and secure algorithms for GLV-based scalar multiplication and their implementation on GLV-GLS curves (extended version).
J. Cryptogr. Eng., 2015

Fourℚ: Four-Dimensional Decompositions on a ℚ-curve over the Mersenne Prime.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Keep Calm and Stay with One (and p>3).
IACR Cryptol. ePrint Arch., 2013

The Realm of the Pairings.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

2012
Efficient Implementation of Bilinear Pairings on ARM Processors.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Implementing 4-Dimensional GLV Method on GLS Elliptic Curves with j-Invariant 0.
IACR Cryptol. ePrint Arch., 2011

Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication.
IACR Cryptol. ePrint Arch., 2011

Faster Explicit Formulas for Computing Pairings over Ordinary Curves.
Proceedings of the Advances in Cryptology - EUROCRYPT 2011, 2011

2010
Analysis of Efficient Techniques for Fast Elliptic Curve Cryptography on x86-64 based Processors.
IACR Cryptol. ePrint Arch., 2010

Efficient Techniques for High-Speed Elliptic Curve Cryptography.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2010

2009
Fast Multibase Methods and Other Several Optimizations for Elliptic Curve Scalar Multiplication.
Proceedings of the Public Key Cryptography, 2009

Novel Precomputation Schemes for Elliptic Curve Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 7th International Conference, 2009

2008
Fast and Flexible Elliptic Curve Point Arithmetic over Prime Fields.
IEEE Trans. Computers, 2008

New Multibase Non-Adjacent Form Scalar Multiplication and its Application to Elliptic Curve Cryptosystems (extended version).
IACR Cryptol. ePrint Arch., 2008

New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields (full version).
IACR Cryptol. ePrint Arch., 2008

Setting Speed Records with the (Fractional) Multibase Non-Adjacent Form Method for Efficient Elliptic Curve Scalar Multiplication.
IACR Cryptol. ePrint Arch., 2008

Accelerating the Scalar Multiplication on Elliptic Curve Cryptosystems over Prime Fields.
IACR Cryptol. ePrint Arch., 2008

New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields.
Proceedings of the Public Key Cryptography, 2008

2007
A Flexible Design of Filterbank Architectures for Discrete Wavelet Transforms.
Proceedings of the IEEE International Conference on Acoustics, 2007


  Loading...