On the cost of computing isogenies between supersingular elliptic curves G Adj, D Cervantes-Vázquez, JJ Chi-Domínguez, A Menezes, ... International Conference on Selected Areas in Cryptography, 322-343, 2018 | 124 | 2018 |
Stronger and faster side-channel protections for CSIDH D Cervantes-Vázquez, M Chenu, JJ Chi-Domínguez, L De Feo, ... Progress in Cryptology–LATINCRYPT 2019: 6th International Conference on …, 2019 | 56 | 2019 |
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents J Chávez-Saab, JJ Chi-Domínguez, S Jaques, F Rodríguez-Henríquez IACR Cryptol. ePrint Arch. 2020, 1520, 2020 | 50 | 2020 |
Optimal strategies for CSIDH JJ Chi-Domínguez, F Rodríguez-Henríquez Cryptology ePrint Archive, 2020 | 24 | 2020 |
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols G Adj, JJ Chi-Domínguez, F Rodríguez-Henríquez IACR Cryptol. ePrint Arch. 2020, 1109, 2020 | 21* | 2020 |
Set it and forget it! Turnkey ECC for instant integration D Belyavsky, BB Brumley, JJ Chi-Domínguez, L Rivera-Zamarripa, ... Annual Computer Security Applications Conference, 760-771, 2020 | 7 | 2020 |
Attacking a binary GLS elliptic curve with magma JJ Chi, T Oliveira Progress in Cryptology--LATINCRYPT 2015: 4th International Conference on …, 2015 | 7 | 2015 |
Fully projective radical isogenies in constant-time JJ Chi-Domínguez, K Reijnders IACR Cryptol. ePrint Arch. 2021, 259, 2021 | 5* | 2021 |
Parallel isogeny path finding with limited memory E Bellini, J Chavez-Saab, JJ Chi-Domínguez, A Esser, S Ionica, ... International Conference on Cryptology in India, 294-316, 2022 | 4 | 2022 |
Faulty isogenies: a new kind of leakage G Adj, JJ Chi-Domínguez, V Mateu, F Rodríguez-Henríquez arXiv preprint arXiv:2202.04896, 2022 | 4 | 2022 |
Déjà Vu: Side-Channel Analysis of Mozilla's NSS SU Hassan, I Gridin, IM Delgado-Lozano, CP García, JJ Chi-Domínguez, ... Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020 | 4 | 2020 |
A note on constructing SIDH-PoK-based signatures after Castryck-Decru attack JJ Chi-Domínguez Cryptology ePrint Archive, 2022 | 3 | 2022 |
Low Memory Attacks on Small Key CSIDH JJ Chi-Domínguez, A Esser, S Kunzweiler, A May International Conference on Applied Cryptography and Network Security, 276-304, 2023 | 2 | 2023 |
Computing Quotient Groups of Smooth Order with Applications to Isogenies over Higher-Dimensional Abelian Varieties JJ Chi-Domínguez, A Pizarro-Madariaga, E Riquelme Cryptology ePrint Archive, 2023 | 2 | 2023 |
Lattice Isomorphism as a Group Action and Hard Problems on Quadratic Forms A Budroni, JJ Chi-Domínguez, M Kulkarni Cryptology ePrint Archive, 2023 | 1 | 2023 |
On the Practicality of Post-Quantum TLS Using Large-Parameter CSIDH F Campos, J Chavez-Saab, JJ Chi-Domínguez, M Meyer, K Reijnders, ... Cryptology ePrint Archive, 2023 | 1 | 2023 |
SIDH-sign: an efficient SIDH PoK-based signature JJ Chi-Domínguez, V Mateu, LP Perin Cryptology ePrint Archive, 2022 | 1 | 2022 |
Extending the GLS endomorphism to speed up GHS Weil descent using Magma JJ Chi-Domínguez, F Rodríguez-Henríquez, B Smith Finite Fields and Their Applications 75, 101891, 2021 | 1 | 2021 |
A formula for disaster: a unified approach to elliptic curve special-point-based attacks V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley Lecture Notes in Computer Science. In preparation. Springer, 2021 | 1 | 2021 |
Elliptic curves in classical and post-quantum cryptography JJ Chi Domínguez Tesis (DC) -- Centro de Investigación y de Estudios Avanzados del IPN …, 2019 | 1 | 2019 |