default search action
Steven D. Galbraith
Person information
- affiliation: University of Auckland, Department of Mathematics, New Zealand
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j42]Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to Hash Into Supersingular Isogeny Graphs. Comput. J. 67(8): 2702-2719 (2024) - [c49]Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. Public Key Cryptography (3) 2024: 36-60 - [i73]Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery:
A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions. IACR Cryptol. ePrint Arch. 2024: 191 (2024) - [i72]Steven D. Galbraith:
Climbing and descending tall volcanos. IACR Cryptol. ePrint Arch. 2024: 924 (2024) - [i71]Steven D. Galbraith, Valerie Gilchrist, Shai Levin, Ari Markowitz:
Further Connections Between Isogenies of Supersingular Curves and Bruhat-Tits Trees. IACR Cryptol. ePrint Arch. 2024: 1971 (2024) - 2023
- [j41]Steven D. Galbraith, Rosario Gennaro, Carla Ràfols, Ron Steinfeld:
Guest editorial: Special issue on Mathematics of Zero-Knowledge. Des. Codes Cryptogr. 91(11): 3331-3332 (2023) - [j40]Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit:
Proving knowledge of isogenies: a survey. Des. Codes Cryptogr. 91(11): 3425-3456 (2023) - [c48]Shalini Banerjee, Steven D. Galbraith, Tariq Khan, John Henry Castellanos, Giovanni Russello:
Preventing Reverse Engineering of Control Programs in Industrial Control Systems. CPSS@AsiaCCS 2023: 48-59 - [c47]Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Evasive Decision Trees. INDOCRYPT (2) 2023: 84-104 - [i70]Shalini Banerjee, Steven D. Galbraith, Giovanni Russello:
Obfuscating Decision Trees. IACR Cryptol. ePrint Arch. 2023: 68 (2023) - [i69]Ward Beullens, Luca De Feo, Steven D. Galbraith, Christophe Petit:
Proving knowledge of isogenies - A survey. IACR Cryptol. ePrint Arch. 2023: 671 (2023) - [i68]Shalini Banerjee, Steven D. Galbraith:
Auditable Obfuscation. IACR Cryptol. ePrint Arch. 2023: 1476 (2023) - [i67]Steven D. Galbraith, Derek Perrin, José Felipe Voloch:
CSIDH with Level Structure. IACR Cryptol. ePrint Arch. 2023: 1726 (2023) - 2022
- [c46]Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig:
SIDH Proof of Knowledge. ASIACRYPT (2) 2022: 310-339 - [c45]Steven D. Galbraith, Yi-Fu Lai:
Attack on SHealS and HealS: The Second Wave of GPST. PQCrypto 2022: 399-421 - [c44]Samuel Dobson, Steven D. Galbraith:
Post-Quantum Signal Key Agreement from SIDH. PQCrypto 2022: 422-450 - [e11]Steven D. Galbraith:
Topics in Cryptology - CT-RSA 2022 - Cryptographers' Track at the RSA Conference 2022, Virtual Event, March 1-2, 2022, Proceedings. Lecture Notes in Computer Science 13161, Springer 2022, ISBN 978-3-030-95311-9 [contents] - [i66]Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. CoRR abs/2205.00135 (2022) - [i65]Samuel Dobson, Steven D. Galbraith, Benjamin Smith:
Trustless unknown-order groups. CoRR abs/2211.16128 (2022) - [i64]Steven D. Galbraith, Yi-Fu Lai:
Attack on SHealS and HealS: the Second Wave of GPST. IACR Cryptol. ePrint Arch. 2022: 443 (2022) - [i63]Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D. Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E. Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig:
Failing to hash into supersingular isogeny graphs. IACR Cryptol. ePrint Arch. 2022: 518 (2022) - [i62]Steven D. Galbraith, Trey Li:
Obfuscation of Evasive Algebraic Set Membership. IACR Cryptol. ePrint Arch. 2022: 1516 (2022) - 2021
- [j39]Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
An adaptive attack on 2-SIDH. Int. J. Comput. Math. Comput. Syst. Theory 6(4): 387-404 (2021) - [j38]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Trans. Priv. Secur. 24(3): 18:1-18:35 (2021) - [c43]Steven D. Galbraith, Trey Li:
Small Superset and Big Subset Obfuscation. ACISP 2021: 68-87 - [c42]Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. EUROCRYPT (1) 2021: 213-241 - [i61]Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig:
SIDH Proof of Knowledge. IACR Cryptol. ePrint Arch. 2021: 1023 (2021) - [i60]Samuel Dobson, Steven D. Galbraith:
Post-Quantum Signal Key Agreement with SIDH. IACR Cryptol. ePrint Arch. 2021: 1187 (2021) - 2020
- [j37]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [j36]Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
An adaptive attack on 2-SIDH. Int. J. Comput. Math. Comput. Syst. Theory 5(4): 282-299 (2020) - [j35]Steven D. Galbraith, Christophe Petit, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. J. Cryptol. 33(1): 130-175 (2020) - [c41]Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats. EUROCRYPT (2) 2020: 608-637 - [c40]Steven D. Galbraith, Lukas Zobernig:
Obfuscating Finite Automata. SAC 2020: 90-114 - [c39]Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit:
On Index Calculus Algorithms for Subfield Curves. SAC 2020: 115-138 - [c38]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-Purpose Program Obfuscation. TrustCom 2020: 394-401 - [i59]Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello, Lukas Zobernig:
Towards a Theory of Special-purpose Program Obfuscation. CoRR abs/2011.02607 (2020) - [i58]Samuel Dobson, Steven D. Galbraith:
Trustless Groups of Unknown Order with Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2020: 196 (2020) - [i57]Steven D. Galbraith, Lukas Zobernig:
Obfuscating Finite Automata. IACR Cryptol. ePrint Arch. 2020: 1009 (2020) - [i56]Yi-Fu Lai, Steven D. Galbraith, Cyprien Delpech de Saint Guilhem:
Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer. IACR Cryptol. ePrint Arch. 2020: 1012 (2020) - [i55]Steven D. Galbraith, Trey Li:
Big Subset and Small Superset Obfuscation. IACR Cryptol. ePrint Arch. 2020: 1018 (2020) - [i54]Steven D. Galbraith, Robert Granger, Simon-Philipp Merz, Christophe Petit:
On Index Calculus Algorithms for Subfield Curves. IACR Cryptol. ePrint Arch. 2020: 1315 (2020)
2010 – 2019
- 2019
- [j34]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem. J. Cryptol. 32(1): 35-83 (2019) - [c37]Luca De Feo, Steven D. Galbraith:
SeaSign: Compact Isogeny Signatures from Class Group Actions. EUROCRYPT (3) 2019: 759-789 - [c36]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. Public Key Cryptography (2) 2019: 379-407 - [c35]Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. TCC (1) 2019: 81-110 - [c34]Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
When are Opaque Predicates Useful? TrustCom/BigDataSE 2019: 168-175 - [e10]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11921, Springer 2019, ISBN 978-3-030-34577-8 [contents] - [e9]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer 2019, ISBN 978-3-030-34620-1 [contents] - [e8]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11923, Springer 2019, ISBN 978-3-030-34617-1 [contents] - [e7]Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang:
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019, ISBN 978-1-4503-6752-3 [contents] - [i53]Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Privacy-preserving Searchable Databases with Controllable Leakage. CoRR abs/1909.11624 (2019) - [i52]Steven D. Galbraith, Jake Massimo, Kenneth G. Paterson:
Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation. IACR Cryptol. ePrint Arch. 2019: 32 (2019) - [i51]Léo Ducas, Steven D. Galbraith, Thomas Prest, Yang Yu:
Integral Matrix Gram Root and Lattice Gaussian Sampling without Floats. IACR Cryptol. ePrint Arch. 2019: 320 (2019) - [i50]Steven D. Galbraith, Lukas Zobernig:
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems. IACR Cryptol. ePrint Arch. 2019: 620 (2019) - [i49]Samuel Dobson, Steven D. Galbraith, Jason T. LeGrow, Yan Bo Ti, Lukas Zobernig:
Extending the Adaptive Attack to 2-SIDH. IACR Cryptol. ePrint Arch. 2019: 890 (2019) - [i48]Samuel Dobson, Steven D. Galbraith:
On the Degree-Insensitive SI-GDH problem and assumption. IACR Cryptol. ePrint Arch. 2019: 929 (2019) - 2018
- [j33]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. Chic. J. Theor. Comput. Sci. 2018 (2018) - [j32]Steven D. Galbraith, Frederik Vercauteren:
Computational problems in supersingular elliptic curve isogenies. Quantum Inf. Process. 17(10): 265 (2018) - [e6]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part I. Lecture Notes in Computer Science 11272, Springer 2018, ISBN 978-3-030-03325-5 [contents] - [e5]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II. Lecture Notes in Computer Science 11273, Springer 2018, ISBN 978-3-030-03328-6 [contents] - [e4]Thomas Peyrin, Steven D. Galbraith:
Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part III. Lecture Notes in Computer Science 11274, Springer 2018, ISBN 978-3-030-03331-6 [contents] - [i47]Steven D. Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren:
Quantum Equivalence of the DLP and CDHP for Group Actions. CoRR abs/1812.09116 (2018) - [i46]Steven D. Galbraith:
Authenticated key exchange for SIDH. IACR Cryptol. ePrint Arch. 2018: 266 (2018) - [i45]Luca De Feo, Steven D. Galbraith:
SeaSign: Compact isogeny signatures from class group actions. IACR Cryptol. ePrint Arch. 2018: 824 (2018) - [i44]Steven D. Galbraith, Lorenz Panny, Benjamin Smith, Frederik Vercauteren:
Quantum Equivalence of the DLP and CDHP for Group Actions. IACR Cryptol. ePrint Arch. 2018: 1199 (2018) - 2017
- [j31]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm. Adv. Math. Commun. 11(3): 453-469 (2017) - [c33]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
P-McDb: Privacy-Preserving Search Using Multi-Cloud Encrypted Databases. CLOUD 2017: 334-341 - [c32]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. ACISP (1) 2017: 266-281 - [c31]Steven D. Galbraith, Christophe Petit, Javier Silva:
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems. ASIACRYPT (1) 2017: 3-33 - [c30]Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith, Giovanni Russello:
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage. FPS 2017: 189-205 - [i43]Steven D. Galbraith, Frederik Vercauteren:
Computational problems in supersingular elliptic curve isogenies. IACR Cryptol. ePrint Arch. 2017: 774 (2017) - [i42]Lukas Zobernig, Steven D. Galbraith, Giovanni Russello:
Indistinguishable Predicates: A New Tool for Obfuscation. IACR Cryptol. ePrint Arch. 2017: 787 (2017) - 2016
- [j30]Steven D. Galbraith, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. Des. Codes Cryptogr. 78(1): 51-72 (2016) - [j29]Christina Delfs, Steven D. Galbraith:
Computing isogenies between supersingular elliptic curves over 𝔽p. Des. Codes Cryptogr. 78(2): 425-440 (2016) - [j28]Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy:
Algorithms for the approximate common divisor problem. LMS J. Comput. Math. 19(A): 58-72 (2016) - [c29]Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti:
On the Security of Supersingular Isogeny Cryptosystems. ASIACRYPT (1) 2016: 63-91 - [c28]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme. ProvSec 2016: 373-383 - [i41]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. CoRR abs/1607.01842 (2016) - [i40]Steven D. Galbraith, Shishay W. Gebregiyorgis, Sean Murphy:
Algorithms for the Approximate Common Divisor Problem. IACR Cryptol. ePrint Arch. 2016: 215 (2016) - [i39]Steven D. Galbraith, Joel Laity, Barak Shani:
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations. IACR Cryptol. ePrint Arch. 2016: 682 (2016) - [i38]Steven D. Galbraith, Christophe Petit, Barak Shani, Yan Bo Ti:
On the Security of Supersingular Isogeny Cryptosystems. IACR Cryptol. ePrint Arch. 2016: 859 (2016) - [i37]Zengpeng Li, Steven D. Galbraith, Chunguang Ma:
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme. IACR Cryptol. ePrint Arch. 2016: 1146 (2016) - [i36]Steven D. Galbraith, Christophe Petit, Javier Silva:
Signature Schemes Based On Supersingular Isogeny Problems. IACR Cryptol. ePrint Arch. 2016: 1154 (2016) - 2015
- [c27]Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. ICITS 2015: 250-268 - [c26]Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption Schemes. ICITS 2015: 283-296 - [i35]Alex Fowler, Steven D. Galbraith:
Kangaroo Methods for Solving the Interval Discrete Logarithm Problem. CoRR abs/1501.07019 (2015) - [i34]Steven D. Galbraith, Barak Shani:
The Multivariate Hidden Number Problem. IACR Cryptol. ePrint Arch. 2015: 111 (2015) - [i33]Ricardo Dahab, Steven D. Galbraith, Eduardo Morais:
Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes. IACR Cryptol. ePrint Arch. 2015: 127 (2015) - [i32]Steven D. Galbraith, Ping Wang, Fangguo Zhang:
Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm. IACR Cryptol. ePrint Arch. 2015: 605 (2015) - [i31]Steven D. Galbraith, Pierrick Gaudry:
Recent progress on the elliptic curve discrete logarithm problem. IACR Cryptol. ePrint Arch. 2015: 1022 (2015) - 2014
- [j27]Nagarjun C. Dwarakanath, Steven D. Galbraith:
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device. Appl. Algebra Eng. Commun. Comput. 25(3): 159-180 (2014) - [j26]Steven D. Galbraith, Chang-An Zhao:
Erratum Self-pairings on hyperelliptic curves [J. Math. Cryptol. 7(2013), 31-42]. J. Math. Cryptol. 8(1): 93 (2014) - [j25]Ilya Chevyrev, Steven D. Galbraith:
Constructing supersingular elliptic curves with a given endomorphism ring. LMS J. Comput. Math. 17(Theory): 71-91 (2014) - [c25]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. ACISP 2014: 322-337 - [c24]Shi Bai, Steven D. Galbraith:
An Improved Compression Technique for Signatures Based on Learning with Errors. CT-RSA 2014: 28-47 - [c23]Steven D. Galbraith, Shishay W. Gebregiyorgis:
Summation Polynomial Algorithms for Elliptic Curves in Characteristic Two. INDOCRYPT 2014: 409-427 - [i30]Shi Bai, Steven D. Galbraith, Liangze Li, Daniel Sheffield:
Improved Exponential-time Algorithms for Inhomogeneous-SIS. IACR Cryptol. ePrint Arch. 2014: 593 (2014) - [i29]Steven D. Galbraith, Shishay W. Gebregiyorgis:
Summation polynomial algorithms for elliptic curves in characteristic two. IACR Cryptol. ePrint Arch. 2014: 806 (2014) - 2013
- [j24]Steven D. Galbraith, Anton Stolbunov:
Improved algorithm for the isogeny problem for ordinary elliptic curves. Appl. Algebra Eng. Commun. Comput. 24(2): 107-131 (2013) - [j23]Steven D. Galbraith, Chang-An Zhao:
Self-pairings on hyperelliptic curves. J. Math. Cryptol. 7(1): 31-42 (2013) - [j22]Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai:
Computing discrete logarithms in an interval. Math. Comput. 82(282): 1181-1195 (2013) - [i28]Shi Bai, Steven D. Galbraith:
An improved compression technique for signatures based on learning with errors. IACR Cryptol. ePrint Arch. 2013: 838 (2013) - [i27]Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. IACR Cryptol. ePrint Arch. 2013: 839 (2013) - 2012
- [b1]Steven D. Galbraith:
Mathematics of Public Key Cryptography. Cambridge University Press 2012, ISBN 9781107013926 - [j21]Steven D. Galbraith, Mark Holmes:
A non-uniform birthday problem with applications to discrete logarithms. Discret. Appl. Math. 160(10-11): 1547-1560 (2012) - [e3]Steven D. Galbraith, Mridul Nandi:
Progress in Cryptology - INDOCRYPT 2012, 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings. Lecture Notes in Computer Science 7668, Springer 2012, ISBN 978-3-642-34930-0 [contents] - [i26]Steven D. Galbraith, Chang-An Zhao:
Self-pairings on Hyperelliptic Curves. IACR Cryptol. ePrint Arch. 2012: 267 (2012) - 2011
- [j20]Philip N. J. Eagle, Steven D. Galbraith, John Ong:
Point compression for Koblitz elliptic curves. Adv. Math. Commun. 5(1): 1-10 (2011) - [j19]Roberto Avanzi, Waldyr D. Benits Junior, Steven D. Galbraith, James F. McKee:
On the distribution of the coefficients of normal forms for Frobenius expansions. Des. Codes Cryptogr. 61(1): 71-89 (2011) - [j18]Steven D. Galbraith, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. J. Cryptol. 24(3): 446-469 (2011) - [i25]Steven D. Galbraith, Anton Stolbunov:
Improved Algorithm for the Isogeny Problem for Ordinary Elliptic Curves. CoRR abs/1105.6331 (2011) - 2010
- [c22]Steven D. Galbraith, Raminder S. Ruprai:
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. Public Key Cryptography 2010: 368-383 - [i24]Steven D. Galbraith, Raminder S. Ruprai:
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval. IACR Cryptol. ePrint Arch. 2010: 615 (2010) - [i23]Steven D. Galbraith, Mark Holmes:
A non-uniform birthday problem with applications to discrete logarithms. IACR Cryptol. ePrint Arch. 2010: 616 (2010) - [i22]Steven D. Galbraith, John M. Pollard, Raminder S. Ruprai:
Computing Discrete Logarithms in an Interval. IACR Cryptol. ePrint Arch. 2010: 617 (2010)
2000 – 2009
- 2009
- [j17]Steven D. Galbraith, Xibin Lin:
Computing pairings using x -coordinates only. Des. Codes Cryptogr. 50(3): 305-324 (2009) - [j16]Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin A. Smith:
Distortion maps for supersingular genus two curves. J. Math. Cryptol. 3(1): 1-18 (2009) - [c21]Steven D. Galbraith, Xibin Lin, Michael Scott:
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves. EUROCRYPT 2009: 518-535 - [c20]Steven D. Galbraith, Raminder S. Ruprai:
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems. IMACC 2009: 368-382 - [i21]Philip N. J. Eagle, Steven D. Galbraith, John Ong:
Point Compression for Koblitz Elliptic Curves. IACR Cryptol. ePrint Arch. 2009: 86 (2009) - 2008
- [j15]Steven D. Galbraith, Raminder S. Ruprai:
Computing L-polynomials of non-hyperelliptic genus 4 and 5 curves (abstract only). ACM Commun. Comput. Algebra 42(1-2): 56-57 (2008) - [j14]Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for cryptographers. Discret. Appl. Math. 156(16): 3113-3121 (2008) - [j13]Steven D. Galbraith, Florian Hess, Frederik Vercauteren:
Aspects of Pairing Inversion. IEEE Trans. Inf. Theory 54(12): 5719-5728 (2008) - [c19]Steven D. Galbraith, Michael Harrison, David J. Mireles Morales:
Efficient Hyperelliptic Arithmetic Using Balanced Representation for Divisors. ANTS 2008: 342-356 - [c18]Steven D. Galbraith, Michael Scott:
Exponentiation in Pairing-Friendly Groups Using Homomorphisms. Pairing 2008: 211-224 - [c17]Steven D. Galbraith, Xibin Lin, David J. Mireles Morales:
Pairings on Hyperelliptic Curves with a Real Model. Pairing 2008: 265-281 - [c16]Steven D. Galbraith, Eric R. Verheul:
An Analysis of the Vector Decomposition Problem. Public Key Cryptography 2008: 308-327 - [e2]Steven D. Galbraith, Kenneth G. Paterson:
Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science 5209, Springer 2008, ISBN 978-3-540-85503-3 [contents] - [i20]Steven D. Galbraith, Xibin Lin:
Computing Pairings Using x-Coordinates Only. IACR Cryptol. ePrint Arch. 2008: 19 (2008) - [i19]Steven D. Galbraith, Michael Scott:
Exponentiation in pairing-friendly groups using homomorphisms. IACR Cryptol. ePrint Arch. 2008: 117 (2008) - [i18]Steven D. Galbraith, Xibin Lin, Michael Scott:
Endomorphisms for faster elliptic curve cryptography on a large class of curves. IACR Cryptol. ePrint Arch. 2008: 194 (2008) - [i17]Wouter Castryck, Steven D. Galbraith, Reza Rezaeian Farashahi:
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation. IACR Cryptol. ePrint Arch. 2008: 218 (2008) - [i16]Steven D. Galbraith, Xibin Lin, David J. Mireles Morales:
Pairings on hyperelliptic curves with a real model. IACR Cryptol. ePrint Arch. 2008: 250 (2008) - [i15]Steven D. Galbraith, Michael Harrison, David J. Mireles Morales:
Efficient Hyperelliptic Arithmetic using Balanced Representation for Divisors. IACR Cryptol. ePrint Arch. 2008: 265 (2008) - 2007
- [j12]Paulo S. L. M. Barreto, Steven D. Galbraith, Colm O'hEigeartaigh, Michael Scott:
Efficient pairing computation on supersingular Abelian varieties. Des. Codes Cryptogr. 42(3): 239-271 (2007) - [j11]Steven D. Galbraith, James F. McKee, P. C. Valença:
Ordinary abelian varieties having small embedding degree. Finite Fields Their Appl. 13(4): 800-814 (2007) - [j10]Steven D. Galbraith, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. J. Math. Cryptol. 1(3): 267-281 (2007) - [c15]Waldyr D. Benits Junior, Steven D. Galbraith:
Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction. IMACC 2007: 336-345 - [c14]Steven D. Galbraith, Florian Hess, Frederik Vercauteren:
Hyperelliptic Pairings. Pairing 2007: 108-131 - [c13]Waldyr D. Benits Junior, Steven D. Galbraith:
The GPS Identification Scheme Using Frobenius Expansions. WEWoRC 2007: 13-27 - [e1]Steven D. Galbraith:
Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings. Lecture Notes in Computer Science 4887, Springer 2007, ISBN 978-3-540-77271-2 [contents] - [i14]Steven D. Galbraith, Florian Hess, Frederik Vercauteren:
Aspects of Pairing Inversion. IACR Cryptol. ePrint Arch. 2007: 256 (2007) - 2006
- [c12]Alexander W. Dent, Steven D. Galbraith:
Hidden Pairings and Trapdoor DDH Groups. ANTS 2006: 436-451 - [i13]Steven D. Galbraith, Kenneth G. Paterson, Nigel P. Smart:
Pairings for Cryptographers. IACR Cryptol. ePrint Arch. 2006: 165 (2006) - [i12]Steven D. Galbraith, Colm O'hEigeartaigh, Caroline Sheedy:
Simplified pairing computation and security implications. IACR Cryptol. ePrint Arch. 2006: 169 (2006) - [i11]Steven D. Galbraith:
Disguising tori and elliptic curves. IACR Cryptol. ePrint Arch. 2006: 248 (2006) - [i10]Steven D. Galbraith, Benjamin A. Smith:
Discrete Logarithms in Generalized Jacobians. IACR Cryptol. ePrint Arch. 2006: 333 (2006) - [i9]Steven D. Galbraith, Jordi Pujolàs, Christophe Ritzenthaler, Benjamin A. Smith:
Distortion maps for genus two curves. IACR Cryptol. ePrint Arch. 2006: 375 (2006) - 2005
- [j9]Steven D. Galbraith, Alfred Menezes:
Algebraic curves and cryptography. Finite Fields Their Appl. 11(3): 544-577 (2005) - [c11]Steven D. Galbraith, Chris Heneghan, James F. McKee:
Tunable Balancing of RSA. ACISP 2005: 280-292 - [c10]Steven D. Galbraith, James F. McKee:
Pairings on Elliptic Curves over Finite Commutative Rings. IMACC 2005: 392-409 - [i8]Steven D. Galbraith:
The Weil pairing on elliptic curves over C. IACR Cryptol. ePrint Arch. 2005: 323 (2005) - 2004
- [j8]Steven D. Galbraith, Victor Rotger:
Easy Decision Diffie-Hellman Groups. LMS J. Comput. Math. 7: 201-218 (2004) - [c9]Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski:
Secure Bilinear Diffie-Hellman Bits. ACISP 2004: 370-378 - [i7]Steven D. Galbraith, Victor Rotger:
Easy decision-Diffie-Hellman groups. IACR Cryptol. ePrint Arch. 2004: 70 (2004) - [i6]Steven D. Galbraith, James F. McKee, P. C. Valença:
Ordinary abelian varieties having small embedding degree. IACR Cryptol. ePrint Arch. 2004: 365 (2004) - [i5]Paulo S. L. M. Barreto, Steven D. Galbraith, Colm O'hEigeartaigh, Michael Scott:
Efficient Pairing Computation on Supersingular Abelian Varieties. IACR Cryptol. ePrint Arch. 2004: 375 (2004) - 2003
- [j7]Steven D. Galbraith:
Weil Descent of Jacobians. Discret. Appl. Math. 128(1): 165-180 (2003) - [c8]Steven D. Galbraith, Wenbo Mao:
Invisibility and Anonymity of Undeniable and Confirmer Signatures. CT-RSA 2003: 80-97 - [i4]Simon R. Blackburn, Carlos Cid, Steven D. Galbraith:
Cryptanalysis of a Cryptosystem based on Drinfeld modules. IACR Cryptol. ePrint Arch. 2003: 223 (2003) - 2002
- [j6]Steven D. Galbraith, John Malone-Lee, Nigel P. Smart:
Public key signatures in the multi-user setting. Inf. Process. Lett. 83(5): 263-266 (2002) - [j5]Steven D. Galbraith:
Elliptic Curve Paillier Schemes. J. Cryptol. 15(2): 129-138 (2002) - [j4]Steven D. Galbraith, Sachar M. Paulus, Nigel P. Smart:
Arithmetic on superelliptic curves. Math. Comput. 71(237): 393-405 (2002) - [c7]Steven D. Galbraith, Keith Harrison, David Soldera:
Implementing the Tate Pairing. ANTS 2002: 324-337 - [c6]Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson:
RSA-Based Undeniable Signatures for General Moduli. CT-RSA 2002: 200-217 - [c5]Steven D. Galbraith, Florian Hess, Nigel P. Smart:
Extending the GHS Weil Descent Attack. EUROCRYPT 2002: 29-44 - [i3]Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski:
Secure Bilinear Diffie-Hellman Bits. IACR Cryptol. ePrint Arch. 2002: 155 (2002) - 2001
- [j3]Steven D. Galbraith:
Weil Descent Of Jacobians. Electron. Notes Discret. Math. 6: 459-468 (2001) - [c4]Steven D. Galbraith:
Supersingular Curves in Cryptography. ASIACRYPT 2001: 495-513 - [i2]Steven D. Galbraith:
Elliptic curve Paillier schemes. IACR Cryptol. ePrint Arch. 2001: 50 (2001) - [i1]Steven D. Galbraith, Florian Hess, Nigel P. Smart:
Extending the GHS Weil Descent Attack. IACR Cryptol. ePrint Arch. 2001: 54 (2001)
1990 – 1999
- 1999
- [j2]Steven D. Galbraith:
Rational Points on XO +(p). Exp. Math. 8(4): 311-318 (1999) - [j1]Steven D. Galbraith:
Constructing Isogenies between Elliptic Curves Over Finite Fields. LMS J. Comput. Math. 2: 118-138 (1999) - [c3]Simon R. Blackburn, Steven D. Galbraith:
Cryptanalysis of Two Cryptosystems Based on Group Actions. ASIACRYPT 1999: 52-61 - [c2]Steven D. Galbraith, Nigel P. Smart:
A Cryptographic Application of Weil Descent. IMACC 1999: 191-200 - [c1]Simon R. Blackburn, Simon Blake-Wilson, Mike Burmester, Steven D. Galbraith:
Weaknesses in Shared RSA Key Generation Protocols. IMACC 1999: 300-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:20 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint