Dustin Moody

Orcid: 0000-0002-4868-6684

According to our database1, Dustin Moody authored at least 25 papers between 2009 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Cryptographic Standards in the Post-Quantum Era.
IEEE Secur. Priv., 2022

2021
Isogenies on twisted Hessian curves.
J. Math. Cryptol., 2021

2020
Combinatorial Rank Attacks Against the Rectangular Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2020

New mission and opportunity for mathematics researchers: Cryptography in the quantum era.
Adv. Math. Commun., 2020

2019
Elliptic Curves Arising From the Triangular Numbers.
Integers, 2019

Twisted Hessian Isogenies.
IACR Cryptol. ePrint Arch., 2019

Homomorphic Encryption Standard.
IACR Cryptol. ePrint Arch., 2019

2017
Arithmetic Progressions on Conics.
J. Integer Seq., 2017

Improved Attacks for Characteristic-2 Parameters of the Cubic ABC Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2017

2016
Analogues of Vélu's formulas for isogenies on alternate models of elliptic curves.
Math. Comput., 2016

Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier.
J. Math. Cryptol., 2016

High Rank Elliptic Curves with Torsion Z/4Z Induced by Kihara's Elliptic Curves.
Integers, 2016

Improved indifferentiability security bound for the JH mode.
Des. Codes Cryptogr., 2016

Key Recovery Attack on the Cubic ABC Simple Matrix Multivariate Encryption Scheme.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

2015
Vulnerabilities of "McEliece in the World of Escher".
IACR Cryptol. ePrint Arch., 2015

2014
An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme.
IACR Cryptol. ePrint Arch., 2014

2012
Families of elliptic curves with rational 3-torsion.
J. Math. Cryptol., 2012

Isomorphism classes of Edwards curves over finite fields.
Finite Fields Their Appl., 2012

Computing isogeny volcanoes of composite degree.
Appl. Math. Comput., 2012

2011
Using 5-isogenies to quintuple points on elliptic curves.
Inf. Process. Lett., 2011

Indifferentiability Security of the Fast Widepipe Hash: Breaking the Birthday Barrier.
IACR Cryptol. ePrint Arch., 2011

Division polynomials for Jacobi quartic curves.
Proceedings of the Symbolic and Algebraic Computation, International Symposium, 2011

2010
Divison Polynomials for Alternate Models of Elliptic Curves.
IACR Cryptol. ePrint Arch., 2010

Mean value formulas for twisted Edwards curves.
IACR Cryptol. ePrint Arch., 2010

2009
The Diffie-Hellman problem and generalization of Verheul's theorem.
Des. Codes Cryptogr., 2009


  Loading...