Frodo: Take off the ring! practical, quantum-secure key exchange from LWE J Bos, C Costello, L Ducas, I Mironov, M Naehrig, V Nikolaenko, ... Proceedings of the 2016 ACM SIGSAC conference on computer and communications …, 2016 | 492 | 2016 |
Post-quantum key exchange for the TLS protocol from the ring learning with errors problem JW Bos, C Costello, M Naehrig, D Stebila 2015 IEEE symposium on security and privacy, 553-570, 2015 | 489 | 2015 |
Efficient algorithms for supersingular isogeny Diffie-Hellman C Costello, P Longa, M Naehrig Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 372 | 2016 |
Geppetto: Versatile verifiable computation C Costello, C Fournet, J Howell, M Kohlweiss, B Kreuter, M Naehrig, ... 2015 IEEE Symposium on Security and Privacy, 253-270, 2015 | 306 | 2015 |
Supersingular isogeny key encapsulation R Azarderakhsh, M Campagna, C Costello, LD Feo, B Hess, A Jalali, ... Submission to the NIST Post-Quantum Standardization project 152, 154-155, 2017 | 270 | 2017 |
Efficient compression of SIDH public keys C Costello, D Jao, P Longa, M Naehrig, J Renes, D Urbanik Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 173 | 2017 |
A simple and compact algorithm for SIDH with arbitrary degree isogenies C Costello, H Hisil Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017 | 170 | 2017 |
Four: four-dimensional decompositions on a-curve over the mersenne prime C Costello, P Longa International Conference on the Theory and Application of Cryptology and …, 2015 | 154 | 2015 |
Selecting elliptic curves for cryptography: an efficiency and security analysis JW Bos, C Costello, P Longa, M Naehrig Journal of Cryptographic Engineering 6, 259-286, 2016 | 145 | 2016 |
Faster pairing computations on curves with high-degree twists C Costello, T Lange, M Naehrig International workshop on public key cryptography, 224-242, 2010 | 143 | 2010 |
Montgomery curves and their arithmetic: The case of large characteristic fields C Costello, B Smith Journal of Cryptographic Engineering 8 (3), 227-240, 2018 | 136 | 2018 |
Fast cryptography in genus 2 JW Bos, C Costello, H Hisil, K Lauter Journal of Cryptology 29, 28-60, 2016 | 111 | 2016 |
Complete addition formulas for prime order elliptic curves J Renes, C Costello, L Batina Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 105 | 2016 |
B-SIDH: supersingular isogeny Diffie-Hellman using twisted torsion C Costello Advances in Cryptology–ASIACRYPT 2020: 26th International Conference on the …, 2020 | 104 | 2020 |
SIKE: Supersingular isogeny key encapsulation D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ... | 59 | 2017 |
Sike D Jao, R Azarderakhsh, M Campagna, C Costello, L De Feo, B Hess, ... National Institute of Standards and Technology, Technical report, 2020 | 58 | 2020 |
Subgroup security in pairing-based cryptography PSLM Barreto, C Costello, R Misoczki, M Naehrig, GCCF Pereira, ... Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015 | 56 | 2015 |
Group law computations on Jacobians of hyperelliptic curves C Costello, K Lauter International Workshop on Selected Areas in Cryptography, 92-117, 2011 | 56 | 2011 |
Improved classical cryptanalysis of SIKE in practice C Costello, P Longa, M Naehrig, J Renes, F Virdia IACR International Conference on Public-Key Cryptography, 505-534, 2020 | 48 | 2020 |
High-performance scalar multiplication using 8-dimensional GLV/GLS decomposition JW Bos, C Costello, H Hisil, K Lauter Cryptographic Hardware and Embedded Systems-CHES 2013: 15th International …, 2013 | 47 | 2013 |