Jason T. LeGrow

Orcid: 0000-0002-6239-6616

According to our database1, Jason T. LeGrow authored at least 20 papers between 2016 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist.
Des. Codes Cryptogr., November, 2024

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

A faster method for fault attack resistance in static/ephemeral CSIDH.
J. Cryptogr. Eng., September, 2023

Influences of some families of error-correcting codes.
CoRR, 2023

Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

2022
Cryptanalysis of "MAKE".
J. Math. Cryptol., 2022

Supersingular Non-Superspecial Abelian Surfaces in Cryptography.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

2021
Towards Isogeny-Based Password-Authenticated Key Establishment.
J. Math. Cryptol., 2021

An adaptive attack on 2-SIDH.
Int. J. Comput. Math. Comput. Syst. Theory, 2021

(Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH.
Proceedings of the Advances in Information and Computer Security, 2021

2020
Design, Analysis, and Optimization of Isogeny-Based Key Establishment Protocols.
PhD thesis, 2020

A subexponential-time, polynomial quantum space algorithm for inverting the CM group action.
J. Math. Cryptol., 2020

An Analysis of Fault Attacks on CSIDH.
IACR Cryptol. ePrint Arch., 2020

How Not to Create an Isogeny-Based PAKE.
IACR Cryptol. ePrint Arch., 2020

2019
Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors.
IACR Cryptol. ePrint Arch., 2019

Extending the Adaptive Attack to 2-SIDH.
IACR Cryptol. ePrint Arch., 2019

2018
An Isogeny-Based Password-Authenticated Key Establishment Protocol.
IACR Cryptol. ePrint Arch., 2018

Modeling Quantum-Safe Authenticated Key Establishment, and an Isogeny-Based Protocol.
IACR Cryptol. ePrint Arch., 2018

2016
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs.
Des. Codes Cryptogr., 2016


  Loading...