Dustin Moody
Titel
Zitiert von
Zitiert von
Jahr
Report on post-quantum cryptography
L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2016
433*2016
Security of homomorphic encryption
M Chase, H Chen, J Ding, S Goldwasser, S Gorbunov, J Hoffstein, ...
HomomorphicEncryption. org, Redmond WA, Tech. Rep, 2017
114*2017
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
812019
Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves
D Moody, D Shumow
Mathematics of Computation 85 (300), 1929-1951, 2016
522016
Post-quantum cryptography: NIST’s plan for the future
D Moody
Talk given at PQCrypto 16, 2016
492016
An asymptotically optimal structural attack on the ABC multivariate encryption scheme
D Moody, R Perlner, D Smith-Tone
International Workshop on Post-Quantum Cryptography, 180-196, 2014
232014
Arithmetic progressions on Edwards curves
D Moody
J. Integer Seq 14 (1), 2011
172011
Improved indifferentiability security bound for the JH mode
D Moody, S Paul, D Smith-Tone
Designs, Codes and Cryptography 79 (2), 237-259, 2016
152016
Status report on the second round of the nist post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2020
14*2020
Key recovery attack on the cubic ABC simple matrix multivariate encryption scheme
D Moody, R Perlner, D Smith-Tone
International Conference on Selected Areas in Cryptography, 543-558, 2016
132016
Recommendation for pair-wise key-establishment schemes using integer factorization cryptography
E Barker, L Chen, D Moody
US Department of Commerce, National Institute of Standards and Technology, 2014
132014
Arithmetic progressions on Huff curves
D Moody
Ann. Math. Inform 38, 111-116, 2011
122011
Integral isosceles triangle–parallelogram and Heron triangle–rhombus pairs with a common area and common perimeter
P Das, A Juyal, D Moody
Journal of number theory 180, 208-218, 2017
102017
Vulnerabilities of “McEliece in the World of Escher”
D Moody, R Perlner
Post-Quantum Cryptography, 104-117, 2016
102016
Isomorphism classes of Edwards curves over finite fields
RR Farashahi, D Moody, H Wu
Finite Fields and Their Applications 18 (3), 597-612, 2012
102012
Elliptic curves arising from Brahmagupta quadrilaterals
F Izadi, F Khoshnam, D Moody, AS Zargar
Bulletin of the Australian Mathematical Society 90 (1), 47-56, 2014
92014
Improved attacks for characteristic-2 parameters of the cubic ABC simple matrix encryption scheme
D Moody, R Perlner, D Smith-Tone
International Workshop on Post-Quantum Cryptography, 255-271, 2017
82017
The Diffie–Hellman problem and generalization of Verheul’s theorem
D Moody
Designs, Codes and Cryptography 52 (3), 381-390, 2009
82009
Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters
L Chen, D Moody, A Regenscheid, K Randall
National Institute of Standards and Technology, 2019
62019
Indifferentiability security of the fast wide pipe hash: Breaking the birthday barrier
D Moody, S Paul, D Smith-Tone
Journal of Mathematical Cryptology 10 (2), 101-133, 2016
62016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20