Follow
Jesús-Javier Chi-Domínguez
Jesús-Javier Chi-Domínguez
Technology Innovation Institute (TII), Abu Dhabi, UAE
Verified email at tii.ae - Homepage
Title
Cited by
Cited by
Year
On the cost of computing isogenies between supersingular elliptic curves
G Adj, D Cervantes-Vázquez, JJ Chi-Domínguez, A Menezes, ...
International Conference on Selected Areas in Cryptography, 322-343, 2018
1052018
Stronger and faster side-channel protections for CSIDH
D Cervantes-Vázquez, M Chenu, JJ Chi-Domínguez, LD Feo, ...
International Conference on Cryptology and Information Security in Latin …, 2019
462019
The SQALE of CSIDH: sublinear Vélu quantum-resistant isogeny action with low exponents
J Chávez-Saab, JJ Chi-Domínguez, S Jaques, F Rodríguez-Henríquez
IACR Cryptol. ePrint Arch. 2020, 1520, 2020
262020
Karatsuba-based square-root Vélu’s formulas applied to two isogeny-based protocols
G Adj, JJ Chi-Domínguez, F Rodríguez-Henríquez
IACR Cryptol. ePrint Arch. 2020, 1109, 2020
13*2020
Optimal strategies for CSIDH
JJ Chi-Domínguez, F Rodríguez-Henríquez
Advances in Mathematics of Communications, 2020
132020
Attacking a binary GLS elliptic curve with magma
JJ Chi, T Oliveira
International Conference on Cryptology and Information Security in Latin …, 2015
72015
Faulty isogenies: a new kind of leakage
G Adj, JJ Chi-Domínguez, V Mateu, F Rodríguez-Henríquez
arXiv preprint arXiv:2202.04896, 2022
42022
Set it and forget it! Turnkey ECC for instant integration
D Belyavsky, BB Brumley, JJ Chi-Domínguez, L Rivera-Zamarripa, ...
Annual Computer Security Applications Conference, 760-771, 2020
42020
Déjà Vu: Side-Channel Analysis of Mozilla's NSS
SU Hassan, I Gridin, IM Delgado-Lozano, CP García, JJ Chi-Domínguez, ...
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
42020
Fully projective radical isogenies in constant-time
JJ Chi-Domínguez, K Reijnders
IACR Cryptol. ePrint Arch. 2021, 259, 2021
3*2021
Extending the GLS endomorphism to speed up GHS Weil descent using Magma
JJ Chi-Domínguez, F Rodríguez-Henríquez, B Smith
Finite Fields and Their Applications 75, 101891, 2021
12021
A formula for disaster: a unified approach to elliptic curve special-point-based attacks
V Sedlacek, JJ Chi-Domínguez, J Jancar, BB Brumley
Lecture Notes in Computer Science. In preparation. Springer, 2021
12021
SIDH-sign: an efficient SIDH PoK-based signature
JJ Chi-Domínguez, V Mateu, LP Perin
Cryptology ePrint Archive, 2022
2022
Curvas elıpticas en la criptografıa clásica y post-cuántica
JJC Domınguez
Instituto Politécnico Nacional, 2019
2019
Elliptic curves in classical and post-quantum cryptography= Curvas elípticas en la criptografía clásica y post-cuántica
JJ Chi Domínguez
Tesis (DC)--Centro de Investigación y de Estudios Avanzados del IPN …, 2019
2019
Politécnico Nacional
JJC Domınguez
Instituto Politécnico Nacional, 2015
2015
El ataque gGHS aplicado a curvas de Galbraith-Lin-Scott
JJ Chi Domínguez
Tesis (MC)--Centro de Investigación y de Estudios Avanzados del IPN …, 2015
2015
The system can't perform the operation now. Try again later.
Articles 1–17