Concrete quantum cryptanalysis of binary elliptic curves G Banegas, DJ Bernstein, I Van Hoof, T Lange Cryptology ePrint Archive, 2020 | 50 | 2020 |
CTIDH: faster constant-time CSIDH G Banegas, DJ Bernstein, F Campos, T Chou, T Lange, M Meyer, B Smith, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 (4 …, 2021 | 40 | 2021 |
DAGS: Key encapsulation using dyadic GS codes G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... Journal of Mathematical Cryptology 12 (4), 221-239, 2018 | 36 | 2018 |
Low-communication parallel quantum multi-target preimage search G Banegas, DJ Bernstein Selected Areas in Cryptography–SAC 2017: 24th International Conference …, 2018 | 35 | 2018 |
A reaction attack against cryptosystems based on LRPC codes S Samardjiska, P Santini, E Persichetti, G Banegas Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019 | 27 | 2019 |
Attacks in stream ciphers: a survey G Banegas Cryptology ePrint Archive, 2014 | 24 | 2014 |
DAGS: Key encapsulation for dyadic GS codes G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... NIST PQC Round 1, 4, 2017 | 20 | 2017 |
Quantum-resistant software update security on low-power networked embedded devices G Banegas, K Zandberg, E Baccelli, A Herrmann, B Smith International Conference on Applied Cryptography and Network Security, 872-891, 2022 | 15 | 2022 |
Non-interactive, secure verifiable aggregation for decentralized, privacy-preserving learning C Brunetta, G Tsaloli, B Liang, G Banegas, A Mitrokotsa Australasian Conference on Information Security and Privacy, 510-528, 2021 | 14 | 2021 |
Practical and provably secure distributed aggregation: Verifiable additive homomorphic secret sharing G Tsaloli, G Banegas, A Mitrokotsa Cryptography 4 (3), 25, 2020 | 14 | 2020 |
: Decentralized, Verifiable Secure Aggregation for Privacy-Preserving Learning G Tsaloli, B Liang, C Brunetta, G Banegas, A Mitrokotsa International Conference on Information Security, 296-319, 2021 | 11 | 2021 |
Designing efficient dyadic operations for cryptographic applications G Banegas, PSLM Barreto, E Persichetti, P Santini Journal of Mathematical Cryptology 14 (1), 95-109, 2020 | 11 | 2020 |
A new class of irreducible pentanomials for polynomial-based multipliers in binary fields G Banegas, R Custódio, D Panario Journal of Cryptographic Engineering 9, 359-373, 2019 | 11 | 2019 |
Disorientation faults in CSIDH G Banegas, J Krämer, T Lange, M Meyer, L Panny, K Reijnders, ... Annual International Conference on the Theory and Applications of …, 2023 | 8 | 2023 |
Efficient supersingularity testing over GF (p) and CSIDH key validation G Banegas, V Gilchrist, B Smith Mathematical Cryptology 2 (1), 21-35, 2022 | 8 | 2022 |
Wavelet: Code-based postquantum signatures with fast verification on microcontrollers G Banegas, T Debris-Alazard, M Nedeljković, B Smith arXiv preprint arXiv:2110.13488, 2021 | 8 | 2021 |
Dags: Reloaded revisiting dyadic key encapsulation G Banegas, PSLM Barreto, BO Boidje, PL Cayrel, GN Dione, K Gaj, ... Code-Based Cryptography: 7th International Workshop, CBC 2019, Darmstadt …, 2019 | 8 | 2019 |
Breaking dpa-protected kyber via the pair-pointwise multiplication EA Bock, G Banegas, C Brzuska, Ł Chmielewski, K Puniamurthy, M Šorf International Conference on Applied Cryptography and Network Security, 101-130, 2024 | 6 | 2024 |
Statically aggregate verifiable random functions and application to e-lottery B Liang, G Banegas, A Mitrokotsa Cryptography 4 (4), 37, 2020 | 6 | 2020 |
Wave G Banegas, K Carrier, A Chailloux, A Couvreur, T Debris-Alazard, ... | 4 | 2023 |