Seguir
Tako Boris Fouotsa
Tako Boris Fouotsa
Postdoc, EPFL
Dirección de correo verificada de epfl.ch - Página principal
Título
Citado por
Citado por
Año
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
TB Fouotsa, T Moriya, C Petit
Annual International Conference on the Theory and Applications of …, 2023
452023
Séta: Supersingular encryption from torsion attacks
L De Feo, C Delpech de Saint Guilhem, TB Fouotsa, P Kutas, A Leroux, ...
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
432021
SCALLOP: scaling the CSI-FiSh
LD Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, B Wesolowski
IACR International Conference on Public-Key Cryptography, 345-375, 2023
422023
Supersingular curves you can trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Annual International Conference on the Theory and Applications of …, 2023
362023
On the isogeny problem with torsion point information
TB Fouotsa, P Kutas, SP Merz, YB Ti
IACR International Conference on Public-Key Cryptography, 142-161, 2022
27*2022
Failing to hash into supersingular isogeny graphs
J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, S Kunzweiler, ...
arXiv preprint arXiv:2205.00135, 2022
232022
SIDH with masked torsion point images
TB Fouotsa
Cryptology ePrint Archive, 2022
222022
A new adaptive attack on SIDH
TB Fouotsa, C Petit
Cryptographers’ Track at the RSA Conference, 322-344, 2022
192022
SimS: a simplification of SiGamal
TB Fouotsa, C Petit
International Conference on Post-Quantum Cryptography, 277-295, 2021
15*2021
New sidh countermeasures for a more efficient key exchange
A Basso, TB Fouotsa
International Conference on the Theory and Application of Cryptology and …, 2023
142023
SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
TB Fouotsa, C Petit
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
112021
Exploring SIDH-Based Signature Parameters
A Basso, M Chen, TB Fouotsa, P Kutas, A Laval, L Marco, GT Saah
International Conference on Applied Cryptography and Network Security, 432-456, 2024
32024
Isogeny problems with level structure
L De Feo, TB Fouotsa, L Panny
Annual International Conference on the Theory and Applications of …, 2024
12024
Failing to hash into supersingular isogeny graphs
C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024
Avoiding Trusted Setup in Isogeny-based Commitments
GT Saah, TB Fouotsa, E Fouotsa, C Nkuimi-Jugnia
Cryptology ePrint Archive, 2024
2024
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
M Duparc, TB Fouotsa, S Vaudenay
Cryptology ePrint Archive, 2024
2024
On the design and cryptanalysis of Isogeny-Based Public Key Encryption schemes
TB Fouotsa
Università Degli Studi di Roma Tre, 2022
2022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–17