- Efficient algorithms for the detection of (N,N)-splittings and endomorphisms
Joint work with Craig Costello and Sam Frengley.
In submission.
(ePrint) - PRISM: Simple And Compact Identification and Signatures From Large Prime Degree Isogenies
Joint work with Andrea Basso, Giacomo Borin, Wouter Castryck, Riccardo Invernizzi, Antonin Leroux, Luciano Maino, Frederik Vercauteren, Benjamin Wesolowski.
In submission.
(ePrint) - Return of the Kummer: a toolbox for genus 2 cryptography
Joint work with Krijn Reijnders.
In submission.
(ePrint) - Isogenies on Kummer Surfaces
Joint work with E. Victor Flynn.
Mathematics of Computation.
(DOI) (arXiv) - Finding Practical Parameters for Isogeny-based Cryptography
Joint work with Jonathan Komada Eriksen, Michael Meyer, and Francisco Rodríguez-Henríquez.
IACR Communications in Cryptology Volume 1, Issue 3.
(DOI) (ePrint) - On cycles of pairing-friendly abelian varieties
Joint work with Craig Costello and Michael Naehrig.
CRYPTO 2024.
(DOI) (ePrint) - Efficient (3,3)-isogenies on fast Kummer surfaces
Joint work with Craig Costello and Benjamin Smith.
Sixteenth Algorithmic Number Theory Symposium (ANTS XVI).
(ePrint) (Talk) - AprèsSQI: Extra Fast Verification for SQIsign Using Extension-Field Signing
Joint work with Jonathan Komada Eriksen, Michael Meyer, and Krijn Reijnders.
Eurocrypt 2024, Best Early-Career Paper Award
(DOI) (ePrint) - An algorithm for efficient detection of (N,N)-splittings and its application to the isogeny problem in dimension 2
Joint work with Craig Costello and Sam Frengley.
PKC 2024, Best Paper Award.
(DOI) (ePrint) (Blogpost) (Talk) - Cryptographic Smooth Neighbors
Joint work with Giacomo Bruno, Craig Costello, Jonathan Komada Eriksen, Michael Meyer, Michael Naehrig, and Bruno Sterner.
Asiacrypt 2023.
(DOI) (ePrint) (Blogpost) - Accelerating the Delfs-Galbraith algorithm with fast subfield root detection
Joint work with Craig Costello and Jia Shi.
CRYPTO 2022.
(DOI) (ePrint) (Blogpost) (Talk)
Thesis
My PhD Thesis: The design, concrete security and efficiency of isogeny-based cryptography