SIDH proof of knowledge L De Feo, S Dobson, SD Galbraith, L Zobernig
International Conference on the Theory and Application of Cryptology and …, 2022
41 2022 Obfuscated fuzzy hamming distance and conjunctions from subset product problems SD Galbraith, L Zobernig
Theory of Cryptography Conference, 81-110, 2019
32 2019 Failing to hash into supersingular isogeny graphs J Booher, R Bowden, J Doliskani, T Boris Fouotsa, SD Galbraith, ...
The Computer Journal, bxae038, 2024
31 2024 An adaptive attack on 2-SIDH S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
27 2020 When are opaque predicates useful? L Zobernig, SD Galbraith, G Russello
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
23 2019 Obfuscating finite automata SD Galbraith, L Zobernig
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
10 2021 Mathematical aspects of program obfuscation L Zobernig
PhD Thesis-University of Auckland, 2020
5 2020 Towards a theory of special-purpose program obfuscation MR Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
3 2020 A note on a static SIDH protocol S Dobson, T Li, L Zobernig
Cryptology ePrint Archive, 2019
3 2019 Indistinguishable Predicates: A New Tool for Obfuscation. L Zobernig, SD Galbraith, G Russello
IACR Cryptol. ePrint Arch. 2017, 787, 2017
3 2017 Supersingular Non-Superspecial Abelian Surfaces in Cryptography J LeGrow, YB Ti, L Zobernig
Mathematical Cryptology 3 (2), 11-23, 2023
2 2023 When Are Opaque Predicates Useful? L Zobernig, SD Galbraith, G Russello
Cryptology ePrint Archive, 2017
2 2017 Genus 2 Curves in Small Characteristic L Zobernig
arXiv preprint arXiv:2111.07270, 2021
1 2021 Failing to hash into supersingular isogeny graphs C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024 Abelian Varieties with -rank Zero YB Ti, G Verret, L Zobernig
arXiv preprint arXiv:2203.08401, 2022
2022 Towards a Theory of Special-purpose Program Obfuscation M Rizwan Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
arXiv e-prints, arXiv: 2011.02607, 2020
2020 Extending the Adaptive Attack to 2-SIDH. S Dobson, SD Galbraith, JT LeGrow, YB Ti, L Zobernig
IACR Cryptol. ePrint Arch. 2019, 890, 2019
2019 The Modular Subset Product Problem and Obfuscation L Zobernig
Modular Subset Products L Zobernig