What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
David Jao
Google Scholar
ORCID:
0000-0002-8073-1692
16
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/asiacrypt
On the Semidirect Discrete Logarithm Problem in Finite Groups.
Christopher Battarbee
Giacomo Borin
Julian Brough
Ryann Cartor
Tobias Hemmert
Nadia Heninger
David Jao
Delaram Kahrobaei
Laura Maddison
Edoardo Persichetti
Angela Robinson
Daniel Smith-Tone
Rainer Steinwandt
2021
conf/sacrypt
Towards Post-Quantum Key-Updatable Public-Key Encryption via Supersingular Isogenies.
Edward Eaton
David Jao
Chelsea Komlo
Youcef Mokrani
2020
conf/acns
How Not to Create an Isogeny-Based PAKE.
Reza Azarderakhsh
David Jao
Brian Koziel
Jason T. LeGrow
Vladimir Soukharev
Oleg Taraskin
2018
conf/ccs
SoK: The Problem Landscape of SIDH.
David Urbanik
David Jao
2018
conf/ctrsa
An Exposure Model for Supersingular Isogeny Diffie-Hellman Key Exchange.
Brian Koziel
Reza Azarderakhsh
David Jao
2017
conf/fc
A Post-quantum Digital Signature Scheme Based on Supersingular Isogenies.
Youngho Yoo
Reza Azarderakhsh
Amir Jalali
David Jao
Vladimir Soukharev
2017
conf/host
On secure implementations of quantum-resistant supersingular isogeny Diffie-Hellman.
Brian Koziel
Reza Azarderakhsh
David Jao
2017
conf/eurocrypt
Efficient Compression of SIDH Public Keys.
Craig Costello
David Jao
Patrick Longa
Michael Naehrig
Joost Renes
David Urbanik
2017
conf/sacrypt
Post-Quantum Static-Static Key Agreement Using Multiple Protocol Instances.
Reza Azarderakhsh
David Jao
Christopher Leonardi
2017
conf/sacrypt
Side-Channel Attacks on Quantum-Resistant Supersingular Isogeny Diffie-Hellman.
Brian Koziel
Reza Azarderakhsh
David Jao
2016
conf/ccs
Key Compression for Isogeny-Based Cryptosystems.
Reza Azarderakhsh
David Jao
Kassem Kalach
Brian Koziel
Christopher Leonardi
2016
conf/cans
NEON-SIDH: Efficient Implementation of Supersingular Isogeny Diffie-Hellman Key Exchange Protocol on ARM.
Brian Koziel
Amir Jalali
Reza Azarderakhsh
David Jao
Mehran Mozaffari Kermani
2012
conf/sacrypt
Efficient Implementation of Bilinear Pairings on ARM Processors.
Gurleen Grewal
Reza Azarderakhsh
Patrick Longa
Shi Hu
David Jao
2008
conf/sacrypt
Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.
Xinxin Fan
Guang Gong
David Jao
2005
conf/ccs
Applications of secure electronic voting to automated privacy-preserving troubleshooting.
Qiang Huang
David Jao
Helen J. Wang
2005
conf/asiacrypt
Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?
David Jao
Stephen D. Miller
Ramarathnam Venkatesan
Coauthors
Amir Jalali
(2)
Angela Robinson
(1)
Brian Koziel
(6)
Chelsea Komlo
(1)
Christopher Battarbee
(1)
Christopher Leonardi
(2)
Craig Costello
(1)
Daniel Smith-Tone
(1)
David Jao
(16)
David Urbanik
(2)
Delaram Kahrobaei
(1)
Edoardo Persichetti
(1)
Edward Eaton
(1)
Giacomo Borin
(1)
Guang Gong
(1)
Gurleen Grewal
(1)
Helen J. Wang
(1)
Jason T. LeGrow
(1)
Joost Renes
(1)
Julian Brough
(1)
Kassem Kalach
(1)
Laura Maddison
(1)
Mehran Mozaffari Kermani
(1)
Michael Naehrig
(1)
Nadia Heninger
(1)
Oleg Taraskin
(1)
Patrick Longa
(2)
Qiang Huang
(1)
Rainer Steinwandt
(1)
Ramarathnam Venkatesan
(1)
Reza Azarderakhsh
(9)
Ryann Cartor
(1)
Shi Hu
(1)
Stephen D. Miller
(1)
Tobias Hemmert
(1)
Vladimir Soukharev
(2)
Xinxin Fan
(1)
Youcef Mokrani
(1)
Youngho Yoo
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to