Seguir
Tako Boris Fouotsa
Tako Boris Fouotsa
Postdoc, EPFL
Dirección de correo verificada de epfl.ch - Página principal
Título
Citado por
Citado por
Año
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
TB Fouotsa, T Moriya, C Petit
Annual International Conference on the Theory and Applications of …, 2023
632023
SCALLOP: scaling the CSI-FiSh
LD Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, B Wesolowski
IACR international conference on public-key cryptography, 345-375, 2023
532023
Supersingular curves you can trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Annual International Conference on the Theory and Applications of …, 2023
532023
Séta: supersingular encryption from torsion attacks
L De Feo, C Delpech de Saint Guilhem, TB Fouotsa, P Kutas, A Leroux, ...
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
522021
Failing to hash into supersingular isogeny graphs
J Booher, R Bowden, J Doliskani, T Boris Fouotsa, SD Galbraith, ...
The Computer Journal, bxae038, 2024
312024
On the isogeny problem with torsion point information
TB Fouotsa, P Kutas, SP Merz, YB Ti
IACR International Conference on Public-Key Cryptography, 142-161, 2022
31*2022
A new adaptive attack on SIDH
TB Fouotsa, C Petit
Cryptographers’ Track at the RSA Conference, 322-344, 2022
272022
SIDH with masked torsion point images
TB Fouotsa
Cryptology ePrint Archive, 2022
242022
New SIDH countermeasures for a more efficient key exchange
A Basso, TB Fouotsa
International Conference on the Theory and Application of Cryptology and …, 2023
192023
SimS: a simplification of SiGamal
TB Fouotsa, C Petit
International Conference on Post-Quantum Cryptography, 277-295, 2021
15*2021
SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
TB Fouotsa, C Petit
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
132021
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
M Duparc, TB Fouotsa
Cryptology ePrint Archive, 2024
122024
Isogeny problems with level structure
L De Feo, TB Fouotsa, L Panny
Annual International Conference on the Theory and Applications of …, 2024
72024
Silbe: an updatable public key encryption scheme from lollipop attacks
M Duparc, TB Fouotsa, S Vaudenay
Cryptology ePrint Archive, 2024
62024
Exploring SIDH-based signature parameters
A Basso, M Chen, TB Fouotsa, P Kutas, A Laval, L Marco, GT Saah
International Conference on Applied Cryptography and Network Security, 432-456, 2024
52024
Failing to hash into supersingular isogeny graphs
C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024
Attacking trapdoors from matrix products
T Decru, TB Fouotsa, P Frixons, V Gilchrist, C Petit
Cryptology ePrint Archive, 2024
2024
Avoiding Trusted Setup in Isogeny-based Commitments
GT Saah, TB Fouotsa, E Fouotsa, C Nkuimi-Jugnia
Cryptology ePrint Archive, 2024
2024
On the design and cryptanalysis of Isogeny-Based Public Key Encryption schemes
TB Fouotsa
Università Degli Studi di Roma Tre, 2022
2022
M-SIDH and MD-SIDH
TB Fouotsa, T Moriya, C Petit
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20