On lions and elligators: An efficient constant-time implementation of CSIDH M Meyer, F Campos, S Reith Post-Quantum Cryptography: 10th International Conference, PQCrypto 2019 …, 2019 | 68 | 2019 |
CTIDH: faster constant-time CSIDH G Banegas, DJ Bernstein, F Campos, T Chou, T Lange, M Meyer, B Smith, ... IACR Transactions on Cryptographic Hardware and Embedded Systems 2021 (4 …, 2021 | 43 | 2021 |
LMS vs XMSS: Comparison of stateful hash-based signature schemes on ARM cortex-M4 F Campos, T Kohlstadt, S Reith, M Stöttinger International Conference on Cryptology in Africa, 258-277, 2020 | 31 | 2020 |
On hybrid SIDH schemes using Edwards and Montgomery curve arithmetic M Meyer, S Reith, F Campos Cryptology ePrint Archive, 2017 | 26 | 2017 |
Assembly or optimized C for lightweight cryptography on RISC-V? F Campos, L Jellema, M Lemmen, L Müller, D Sprenkels, B Viguier Cryptology and Network Security: 19th International Conference, CANS 2020 …, 2020 | 20 | 2020 |
Trouble at the CSIDH: protecting CSIDH with dummy-operations against fault injection attacks F Campos, MJ Kannwischer, M Meyer, H Onuki, M Stöttinger 2020 Workshop on Fault Detection and Tolerance in Cryptography (FDTC), 57-65, 2020 | 18 | 2020 |
Separating Oil and Vinegar with a Single Trace: Side-Channel Assisted Kipnis-Shamir Attack on UOV T Aulbach, F Campos, J Krämer, S Samardjiska, M Stöttinger IACR Transactions on Cryptographic Hardware and Embedded Systems, 221-245, 2023 | 13 | 2023 |
Optimizations and Practicality of High-Security CSIDH F Campos, J Chávez-Saab, JJ Chi-Domínguez, M Meyer, K Reijnders, ... | 12* | 2024 |
Safe-error attacks on SIKE and CSIDH F Campos, J Krämer, M Müller International Conference on Security, Privacy, and Applied Cryptography …, 2021 | 12 | 2021 |
The specification of MAYO W Beullens, F Campos, S Celi, B Hess, M Kannwischer | 12* | |
On actively secure fine-grained access structures from isogeny assumptions F Campos, P Muth International Conference on Post-Quantum Cryptography, 375-398, 2022 | 10 | 2022 |
Patient Zero & Patient Six: Zero-Value and Correlation Attacks on CSIDH and SIKE F Campos, M Meyer, K Reijnders, M Stöttinger International Conference on Selected Areas in Cryptography, 234-262, 2022 | 8 | 2022 |
Nibbling MAYO: Optimized implementations for AVX2 and Cortex-M4 W Beullens, F Campos, S Celi, B Hess, MJ Kannwischer Cryptology ePrint Archive, 2023 | 4 | 2023 |
Post-quantum cryptography for ECU security use cases F Campos, M Meyer, S Sanwald, M Stöttinger, Y Wang Ruhr-Universität Bochum, 2019 | 3 | 2019 |
Isogeny-based key agreement: Optimizations, secure implementation, and applications FF Campos Sl: sn, 2023 | | 2023 |