Steven D. Galbraith
Orcid: 0000-0001-7114-8377Affiliations:
- University of Auckland, Department of Mathematics, New Zealand
According to our database1,
Steven D. Galbraith
authored at least 114 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
2023
Des. Codes Cryptogr., November, 2023
Proceedings of the Progress in Cryptology - INDOCRYPT 2023, 2023
Proceedings of the 9th ACM Cyber-Physical System Security Workshop, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
2021
Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage.
ACM Trans. Priv. Secur., 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems.
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
2019
Improved Combinatorial Algorithms for the Inhomogeneous Short Integer Solution Problem.
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the 18th IEEE International Conference On Trust, 2019
2018
Quantum Inf. Process., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations.
Chic. J. Theor. Comput. Sci., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Computing elliptic curve discrete logarithms with improved baby-step giant-step algorithm.
Adv. Math. Commun., 2017
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage.
Proceedings of the Foundations and Practice of Security - 10th International Symposium, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the 2017 IEEE 10th International Conference on Cloud Computing (CLOUD), 2017
2016
Preventing Adaptive Key Recovery Attacks on the Gentry-Sahai-Waters Leveled Homomorphic Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
Des. Codes Cryptogr., 2016
Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme.
Proceedings of the Provable Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
2014
LMS J. Comput. Math., 2014
J. Math. Cryptol., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Sampling from discrete Gaussians for lattice-based cryptography on a constrained device.
Appl. Algebra Eng. Commun. Comput., 2014
2013
IACR Cryptol. ePrint Arch., 2013
Appl. Algebra Eng. Commun. Comput., 2013
2012
Discret. Appl. Math., 2012
Cambridge University Press, ISBN: 9781107013926, 2012
2011
J. Cryptol., 2011
Des. Codes Cryptogr., 2011
2010
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.
IACR Cryptol. ePrint Arch., 2010
2009
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems.
Proceedings of the Cryptography and Coding, 2009
2008
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Efficient arithmetic on elliptic curves using a mixed Edwards-Montgomery representation.
IACR Cryptol. ePrint Arch., 2008
ACM Commun. Comput. Algebra, 2008
Proceedings of the Public Key Cryptography, 2008
2007
Finite Fields Their Appl., 2007
Des. Codes Cryptogr., 2007
Proceedings of the Research in Cryptology, Second Western European Workshop, 2007
Proceedings of the Cryptography and Coding, 2007
2006
Proceedings of the Algorithmic Number Theory, 7th International Symposium, 2006
2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Topics in Cryptology, 2003
2002
Proceedings of the Topics in Cryptology, 2002
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
2001
Proceedings of the Advances in Cryptology, 2001
1999
LMS J. Comput. Math., 1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Cryptography and Coding, 1999
Proceedings of the Advances in Cryptology, 1999