[go: up one dir, main page]

Follow
Jason LeGrow
Jason LeGrow
Assistant Professor of Mathematics, Virginia Polytechnic Institute and State University
Verified email at vt.edu
Title
Cited by
Cited by
Year
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
592023
Further optimizations of CSIDH: A systematic approach to efficient strategies, permutations, and bound vectors
A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh
Applied Cryptography and Network Security: 18th International Conference …, 2020
512020
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
S Katsumata, YF Lai, JT LeGrow, L Qin
Designs, Codes and Cryptography 92 (11), 3587–3643, 2024
382024
Towards isogeny-based password-authenticated key establishment
O Taraskin, V Soukharev, D Jao, JT LeGrow
Journal of Mathematical Cryptology 15 (1), 18-30, 2020
32*2020
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
302020
How not to create an isogeny-based PAKE
R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin
Applied Cryptography and Network Security: 18th International Conference …, 2020
232020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez
Journal of Mathematical Cryptology 14 (1), 129-138, 2020
22*2020
Cryptanalysis of “MAKE”
DRL Brown, N Koblitz, JT LeGrow
Journal of Mathematical Cryptology 16 (1), 98-102, 2022
212022
(Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH
JT LeGrow, A Hutchinson
International Workshop on Security, 216-226, 2021
16*2021
Post-quantum security of authenticated key establishment protocols
J LeGrow
University of Waterloo, 2016
14*2016
A faster method for fault attack resistance in static/ephemeral CSIDH
JT LeGrow
Journal of Cryptographic Engineering 13 (3), 283-294, 2023
52023
Post-quantum blind signatures from matrix code equivalence
V Kuchta, JT LeGrow, E Persichetti
Cryptology ePrint Archive, 2025
42025
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs
JT LeGrow, DA Pike, J Poulin
Designs, Codes and Cryptography 80 (3), 421-433, 2016
42016
Cycles and cuts in supersingular L-isogeny graphs
S Arpin, R Bowden, J Clements, W Ghantous, JT LeGrow, K Maughan
arXiv preprint arXiv:2502.00638, 2025
32025
Supersingular non-superspecial abelian surfaces in cryptography
J LeGrow, YB Ti, L Zobernig
Mathematical Cryptology 3 (2), 11-23, 2023
32023
Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
T Chiu, J LeGrow, W Xiong
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware …, 2024
22024
Design, analysis, and optimization of isogeny-based key establishment protocols
JT LeGrow
University of Waterloo, 2020
12020
Influences of some families of error-correcting codes
H Egan, JT LeGrow, GL Matthews, J Suliga
Involve, a Journal of Mathematics 18 (2), 329-349, 2025
2025
Masking Countermeasures Against Side-Channel Attacks on Quantum Computers
JT LeGrow, T Morrison, J Sikora, N Swanson
2024 IEEE International Conference on Quantum Computing and Engineering (QCE …, 2024
2024
CSI-Otter: Isogeny-based (partially) blind signatures from the class group action with a twist
S Katsumata, YF Lai, JT LeGrow, L Qin
Annual International Cryptology Conference, 729-761, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–20