Thomas Pornin

According to our database1, Thomas Pornin authored at least 34 papers between 1998 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Faster Complete Formulas for the GLS254 Binary Curve.
IACR Cryptol. ePrint Arch., 2023

Optimized Discrete Logarithm Computation for Faster Square Roots in Finite Fields.
IACR Cryptol. ePrint Arch., 2023

Improved Key Pair Generation for Falcon, BAT and Hawk.
IACR Cryptol. ePrint Arch., 2023

2022
BAT: Small and Fast KEM over NTRU Lattices.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022

Efficient and Complete Formulas for Binary Curves.
IACR Cryptol. ePrint Arch., 2022

Point-Halving and Subgroup Membership in Twisted Edwards Curves.
IACR Cryptol. ePrint Arch., 2022

Double-Odd Jacobi Quartic.
IACR Cryptol. ePrint Arch., 2022

Truncated EdDSA/ECDSA Signatures.
IACR Cryptol. ePrint Arch., 2022

EcGFp5: a Specialized Elliptic Curve.
IACR Cryptol. ePrint Arch., 2022

2021
Paradoxical Compression with Verifiable Delay Functions.
IACR Cryptol. ePrint Arch., 2021

2020
Saturnin: a suite of lightweight symmetric algorithms for post-quantum security.
IACR Trans. Symmetric Cryptol., 2020

Double-Odd Elliptic Curves.
IACR Cryptol. ePrint Arch., 2020

Optimized Binary GCD for Modular Inversion.
IACR Cryptol. ePrint Arch., 2020

Optimized Lattice Basis Reduction In Dimension 2, and Fast Schnorr and EdDSA Signature Verification.
IACR Cryptol. ePrint Arch., 2020

Efficient Elliptic Curve Operations On Microcontrollers With Finite Field Extensions.
IACR Cryptol. ePrint Arch., 2020

2019
More Efficient Algorithms for the NTRU Key Generation using the Field Norm.
IACR Cryptol. ePrint Arch., 2019

New Efficient, Constant-Time Implementations of Falcon.
IACR Cryptol. ePrint Arch., 2019

2015
Optimizing MAKWA on GPU and CPU.
IACR Cryptol. ePrint Arch., 2015

2014
Using quantum key distribution for cryptographic purposes: A survey.
Theor. Comput. Sci., 2014

2013
Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA).
RFC, August, 2013

2009
Indifferentiability with Distinguishers: Why Shabal Does Not Require Ideal Ciphers.
IACR Cryptol. ePrint Arch., 2009


2008
Sosemanuk, a Fast Software-Oriented Stream Cipher.
Proceedings of the New Stream Cipher Designs - The eSTREAM Finalists, 2008


SOSEMANUK: a fast software-oriented stream cipher
CoRR, 2008

2007
Trapdoor Hard-to-Invert Group Isomorphisms and Their Application to Password-Based Authentication.
J. Cryptol., 2007

SECOQC White Paper on Quantum Key Distribution and Cryptography
CoRR, 2007

Perfect Block Ciphers with Small Blocks.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2005
Digital Signatures Do Not Guarantee Exclusive Ownership.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange.
Proceedings of the Advances in Cryptology, 2004

2003
Did Filiol Break AES ?
IACR Cryptol. ePrint Arch., 2003

2001
Transparent Harddisk Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2001

2000
Software-Hardware Trade-Offs: Application to A5/1 Cryptanalysis.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2000

1998
Optimal Resistance Against the Davies and Murphy Attack.
Proceedings of the Advances in Cryptology, 1998


  Loading...