Suivre
Dustin Moody
Titre
Citée par
Citée par
Année
Report on post-quantum cryptography
L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, R Perlner, ...
US Department of Commerce, National Institute of Standards and Technology, 2016
10372016
Status report on the first round of the NIST post-quantum cryptography standardization process
G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ...
US Department of Commerce, National Institute of Standards and Technology, 2019
7242019
Security of homomorphic encryption
M Chase, H Chen, J Ding, S Goldwasser, S Gorbunov, J Hoffstein, ...
HomomorphicEncryption. org, Redmond WA, Tech. Rep, 2017
672*2017
Status report on the second round of the NIST post-quantum cryptography standardization process
G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ...
US Department of Commerce, NIST 2, 69, 2020
510*2020
Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves
D Moody, D Shumow
Mathematics of Computation 85 (300), 1929-1951, 2016
1302016
Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters
L Chen, D Moody, A Regenscheid, K Randall
National Institute of Standards and Technology, 2019
1222019
Post-quantum cryptography: NIST’s plan for the future
D Moody
The Seventh International Conference on Post-Quntum Cryptography, Japan, 2016
932016
Recommendation for pair-wise key-establishment using integer factorization cryptography
E Barker, L Chen, A Roginsky, A Vassilev, R Davis, S Simon
National Institute of Standards and Technology, 2018
732018
Report on pairing-based cryptography
D Moody, R Peralta, R Perlner, A Regenscheid, A Roginsky, L Chen
Journal of research of the National Institute of Standards and Technology …, 2015
732015
Nist report on post-quantum cryptography
D Moody, L Chen, S Jordan, YK Liu, D Smith, R Perlner, R Peralta
National Institute of Standards and Technology, US Department of Commerce …, 2016
582016
Status report on the first round of the nist post-quantum cryptography standardization process
D Moody, G Alagic, JM Alperin-Sheriff, DC Apon, DA Cooper, QH Dang, ...
Technical report, National Institute of Standards and Technology, 2019
422019
An asymptotically optimal structural attack on the ABC multivariate encryption scheme
D Moody, R Perlner, D Smith-Tone
Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014 …, 2014
342014
Digital signature standard (DSS)
L Chen, D Moody, A Regenscheid, A Robinson
Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson, 2023
292023
Let’s get ready to rumble. the nist pqc “competition”
D Moody
Proc. of First PQC Standardization Conference, 11-13, 2018
252018
Vulnerabilities of “McEliece in the World of Escher”
D Moody, R Perlner
Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016
242016
Arithmetic progressions on Edwards curves
D Moody
J. Integer Seq 14 (1), 11.1, 2011
242011
Assessing the benefits and risks of quantum computers
TL Scholten, CJ Williams, D Moody, M Mosca, W Hurley, WJ Zeng, ...
arXiv preprint arXiv:2401.16317, 2024
222024
Isogenies on twisted Hessian curves
FL Perez Broon, T Dang, E Fouotsa, D Moody
Journal of mathematical cryptology 15 (1), 345-358, 2021
21*2021
Key recovery attack on the cubic ABC simple matrix multivariate encryption scheme
D Moody, R Perlner, D Smith-Tone
Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017
212017
Improved indifferentiability security bound for the JH mode
D Moody, S Paul, D Smith-Tone
Designs, Codes and Cryptography 79 (2), 237-259, 2016
202016
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20