Report on post-quantum cryptography L Chen, L Chen, S Jordan, YK Liu, D Moody, R Peralta, R Perlner, ... US Department of Commerce, National Institute of Standards and Technology, 2016 | 1037 | 2016 |
Status report on the first round of the NIST post-quantum cryptography standardization process G Alagic, G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, YK Liu, ... US Department of Commerce, National Institute of Standards and Technology, 2019 | 724 | 2019 |
Security of homomorphic encryption M Chase, H Chen, J Ding, S Goldwasser, S Gorbunov, J Hoffstein, ... HomomorphicEncryption. org, Redmond WA, Tech. Rep, 2017 | 672* | 2017 |
Status report on the second round of the NIST post-quantum cryptography standardization process G Alagic, J Alperin-Sheriff, D Apon, D Cooper, Q Dang, J Kelsey, YK Liu, ... US Department of Commerce, NIST 2, 69, 2020 | 510* | 2020 |
Analogues of Vélu’s formulas for isogenies on alternate models of elliptic curves D Moody, D Shumow Mathematics of Computation 85 (300), 1929-1951, 2016 | 130 | 2016 |
Recommendations for discrete logarithm-based cryptography: Elliptic curve domain parameters L Chen, D Moody, A Regenscheid, K Randall National Institute of Standards and Technology, 2019 | 122 | 2019 |
Post-quantum cryptography: NIST’s plan for the future D Moody The Seventh International Conference on Post-Quntum Cryptography, Japan, 2016 | 93 | 2016 |
Recommendation for pair-wise key-establishment using integer factorization cryptography E Barker, L Chen, A Roginsky, A Vassilev, R Davis, S Simon National Institute of Standards and Technology, 2018 | 73 | 2018 |
Report on pairing-based cryptography D Moody, R Peralta, R Perlner, A Regenscheid, A Roginsky, L Chen Journal of research of the National Institute of Standards and Technology …, 2015 | 73 | 2015 |
Nist report on post-quantum cryptography D Moody, L Chen, S Jordan, YK Liu, D Smith, R Perlner, R Peralta National Institute of Standards and Technology, US Department of Commerce …, 2016 | 58 | 2016 |
Status report on the first round of the nist post-quantum cryptography standardization process D Moody, G Alagic, JM Alperin-Sheriff, DC Apon, DA Cooper, QH Dang, ... Technical report, National Institute of Standards and Technology, 2019 | 42 | 2019 |
An asymptotically optimal structural attack on the ABC multivariate encryption scheme D Moody, R Perlner, D Smith-Tone Post-Quantum Cryptography: 6th International Workshop, PQCrypto 2014 …, 2014 | 34 | 2014 |
Digital signature standard (DSS) L Chen, D Moody, A Regenscheid, A Robinson Lily Chen, Dustin Moody, Andrew Regenscheid, Angela Robinson, 2023 | 29 | 2023 |
Let’s get ready to rumble. the nist pqc “competition” D Moody Proc. of First PQC Standardization Conference, 11-13, 2018 | 25 | 2018 |
Vulnerabilities of “McEliece in the World of Escher” D Moody, R Perlner Post-Quantum Cryptography: 7th International Workshop, PQCrypto 2016 …, 2016 | 24 | 2016 |
Arithmetic progressions on Edwards curves D Moody J. Integer Seq 14 (1), 11.1, 2011 | 24 | 2011 |
Assessing the benefits and risks of quantum computers TL Scholten, CJ Williams, D Moody, M Mosca, W Hurley, WJ Zeng, ... arXiv preprint arXiv:2401.16317, 2024 | 22 | 2024 |
Isogenies on twisted Hessian curves FL Perez Broon, T Dang, E Fouotsa, D Moody Journal of mathematical cryptology 15 (1), 345-358, 2021 | 21* | 2021 |
Key recovery attack on the cubic ABC simple matrix multivariate encryption scheme D Moody, R Perlner, D Smith-Tone Selected Areas in Cryptography–SAC 2016: 23rd International Conference, St …, 2017 | 21 | 2017 |
Improved indifferentiability security bound for the JH mode D Moody, S Paul, D Smith-Tone Designs, Codes and Cryptography 79 (2), 237-259, 2016 | 20 | 2016 |