• 32 Citations
20172019

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 32 Citations
  • 4 Report
  • 4 Conference contribution
  • 1 Chapter
2019

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Citations (Scopus)
51 Downloads (Pure)

Tiny wireguard tweak

Appelbaum, J. R., Martindale, C. R. & Wu, S. P., 1 Jan 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Buchmann, J. (eds.). Cham: Springer, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

23 Citations (Scopus)

CSIDH: an efficient Post-Quantum Commutative Group Action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 2018, IACR. 33 p. (Cryptology ePrint Archive; vol. 2018/383)

Research output: Book/ReportReportAcademic

Open Access
File
44 Downloads (Pure)

Hilbert modular polynomials

Martindale, C. R., 2018

Research output: Book/ReportReportAcademic

Open Access
File
26 Downloads (Pure)

Optimal TNFS-secure pairings on elliptic curves with even embedding degree

Martindale, C. R. & Fotiadis, G., 2018, 30 p. (Cryptology ePrint archive; vol. 2018/969)

Research output: Book/ReportReportAcademic

Open Access
File
14 Downloads (Pure)

Pairing-friendly twisted Hessian curves

Chuengsatiansup, C. & Martindale, C. R., 2018, Progress in Cryptology - INDOCRYPT 2018: Asymmetic Key Cryptography and Cryptanalysis. Chakraborty, D. & Iwata, T. (eds.). Berlin: Springer, p. 228-247 20 p. (Lecture Notes in Computer Science; vol. 11356).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 2018, IACR. 56 p. (Cryptology ePrint Archive; vol. 2018/1059)

Research output: Book/ReportReportAcademic

Open Access
File
53 Downloads (Pure)
2017

Isogenies for point counting on genus two hyperelliptic curves with maximal real multiplication

Ballentine, S., Guillevic, A., Lorenzo-Garcia, E., Martindale, C. R., Maisserer, M., Smith, B. & Top, J., 2017, Algebraic geometry for coding theory and cryptography. Howe, E. W., Lauter, K. E. & Walker, J. L. (eds.). Cham: Springer, p. 63-94 32 p. (Association for Women in Mathematics Series; vol. 9).

Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

1 Citation (Scopus)