Pairings for cryptographers SD Galbraith, KG Paterson, NP Smart Discrete Applied Mathematics 156 (16), 3113-3121, 2008 | 986 | 2008 |

Pairings for cryptographers SD Galbraith, KG Paterson, NP Smart Discrete Applied Mathematics 156 (16), 3113-3121, 2008 | 986 | 2008 |

Implementing the Tate pairing SD Galbraith, K Harrison, D Soldera International Algorithmic Number Theory Symposium, 324-337, 2002 | 756 | 2002 |

Efficient pairing computation on supersingular abelian varieties PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh, M Scott Designs, Codes and Cryptography 42 (3), 239-271, 2007 | 635 | 2007 |

Mathematics of public key cryptography SD Galbraith Cambridge University Press, 2012 | 528 | 2012 |

Supersingular curves in cryptography SD Galbraith International Conference on the Theory and Application of Cryptology and …, 2001 | 317 | 2001 |

On the security of supersingular isogeny cryptosystems SD Galbraith, C Petit, B Shani, YB Ti International Conference on the Theory and Application of Cryptology and …, 2016 | 224 | 2016 |

An improved compression technique for signatures based on learning with errors S Bai, SD Galbraith Cryptographers’ Track at the RSA Conference, 28-47, 2014 | 196 | 2014 |

Pairings SD Galbraith book Advances in elliptic curve cryptography, 2005 | 168 | 2005 |

Extending the GHS Weil descent attack SD Galbraith, F Hess, NP Smart International Conference on the Theory and Applications of Cryptographic …, 2002 | 164 | 2002 |

Identification protocols and signature schemes based on supersingular isogeny problems SD Galbraith, C Petit, J Silva International conference on the theory and application of cryptology and …, 2017 | 160 | 2017 |

Invisibility and anonymity of undeniable and confirmer signatures SD Galbraith, W Mao Cryptographers’ Track at the RSA Conference, 80-97, 2003 | 159 | 2003 |

Constructing isogenies between elliptic curves over finite fields SD Galbraith LMS Journal of Computation and Mathematics 2, 118-138, 1999 | 158 | 1999 |

A cryptographic application of Weil descent NP Smart IMA International Conference on Cryptography and Coding, 191-200, 1999 | 143 | 1999 |

Sampling from discrete Gaussians for lattice-based cryptography on a constrained device NC Dwarakanath, SD Galbraith Applicable Algebra in Engineering, Communication and Computing 25 (3), 159-180, 2014 | 139 | 2014 |

Recent progress on the elliptic curve discrete logarithm problem SD Galbraith, P Gaudry Designs, Codes and Cryptography 78 (1), 51-72, 2016 | 132 | 2016 |

Ordinary abelian varieties having small embedding degree SD Galbraith, JF McKee, PC Valença Finite Fields and Their Applications 13 (4), 800-814, 2007 | 130 | 2007 |

Computing isogenies between supersingular elliptic curves over F p C Delfs, SD Galbraith Designs, Codes and Cryptography 78 (2), 425-440, 2016 | 127 | 2016 |

Elliptic curve Paillier schemes SD Galbraith Journal of Cryptology 15 (2), 129-138, 2002 | 123 | 2002 |

Lattice decoding attacks on binary LWE S Bai, SD Galbraith Australasian Conference on Information Security and Privacy, 322-337, 2014 | 118 | 2014 |