Wouter Castryck

Orcid: 0000-0002-0191-5216

According to our database1, Wouter Castryck authored at least 46 papers between 2006 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
KLPT²: Algebraic Pathfinding in Dimension Two and Applications.
IACR Cryptol. ePrint Arch., 2025

PRISM: Simple and Compact Identification and Signatures from Large Prime Degree Isogenies.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Orient Express: Using Frobenius to Express Oriented Isogenies.
Proceedings of the Progress in Cryptology - LATINCRYPT 2025, 2025

KLPT<sup>2</sup>: Algebraic Pathfinding in Dimension Two and Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

2024
Breaking and Repairing SQIsign2D-East.
IACR Cryptol. ePrint Arch., 2024

Generalized Class Group Actions on Oriented Elliptic Curves with Level Structure.
Proceedings of the Arithmetic of Finite Fields - 10th International Workshop, 2024

SQIsign2D-East: A New Signature Scheme Using 2-Dimensional Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
An infinite class of Neumaier graphs and non-existence results.
J. Comb. Theory A, 2023

An Efficient Key Recovery Attack on SIDH.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Weak Instances of Class Group Action Based Cryptography via Self-pairings.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

A Polynomial Time Attack on Instances of M-SIDH and FESTA.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory: Extended Version.
J. Cryptol., 2022

On the decisional Diffie-Hellman problem for class group actions on oriented elliptic curves.
IACR Cryptol. ePrint Arch., 2022

An efficient key recovery attack on SIDH (preliminary version).
IACR Cryptol. ePrint Arch., 2022

Two Remarks on the Vectorization Problem.
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022

Horizontal Racewalking Using Radical Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Multiradical isogenies.
IACR Cryptol. ePrint Arch., 2021

SoK: On the Security of Cryptographic Problems from Linear Algebra.
IACR Cryptol. ePrint Arch., 2021

A Fusion Algorithm for Solving the Hidden Shift Problem in Finite Abelian Groups.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021

2020
CSIDH on the Surface.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Rational Isogenies from Irrational Endomorphisms.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

Breaking the Decisional Diffie-Hellman Problem for Class Group Actions Using Genus Theory.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

Radical Isogenies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Hash functions from superspecial genus-2 curves using Richelot isogenies.
IACR Cryptol. ePrint Arch., 2019

A Framework for Cryptographic Problems from Linear Algebra.
IACR Cryptol. ePrint Arch., 2019

2018
On the Security of the Multivariate Ring Learning with Errors Problem.
IACR Cryptol. ePrint Arch., 2018

Efficiently Processing Complex-Valued Data in Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2018

Translating Between the Roots of the Identity in Quantum Computers.
Proceedings of the 48th IEEE International Symposium on Multiple-Valued Logic, 2018

Homomorphic SIM ^2 D Operations: Single Instruction Much More Data.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

CSIDH: An Efficient Post-Quantum Commutative Group Action.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Homomorphic SIM<sup>2</sup>D Operations: Single Instruction Much More Data.
IACR Cryptol. ePrint Arch., 2017

Hypersurfaces in weighted projective spaces over finite fields with applications to coding theory.
CoRR, 2017

Faster Homomorphic Function Evaluation Using Non-integral Base Encoding.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Privacy-Friendly Forecasting for the Smart Grid Using Homomorphic Encryption and the Group Method of Data Handling.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2017, 2017

2016
On error distributions in ring-based LWE.
LMS J. Comput. Math., 2016

On the tightness of the error bound in Ring-LWE.
IACR Cryptol. ePrint Arch., 2016

Provably Weak Instances of Ring-LWE Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

2015
The lattice size of a lattice polygon.
J. Comb. Theory A, 2015

2014
Constraints on counterexamples to the Casas-Alvero conjecture and a verification in degree 12.
Math. Comput., 2014

Curves in characteristic 2 with non-trivial 2-torsion.
Adv. Math. Commun., 2014

2012
Moving Out the Edges of a Lattice Polygon.
Discret. Comput. Geom., 2012

2011
Toric forms of elliptic curves and their arithmetic.
J. Symb. Comput., 2011

2008
A Shortened Classical Proof of the Quadratic Reciprocity Law.
Am. Math. Mon., 2008

Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation.
IACR Cryptol. ePrint Arch., 2008

Computing Zeta Functions in Families of Ca, b.
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008

2006
Computing Zeta Functions of Nondegenerate Curves.
IACR Cryptol. ePrint Arch., 2006


  Loading...