| Pairings for cryptographers SD Galbraith, KG Paterson, NP Smart Discrete Applied Mathematics 156 (16), 3113-3121, 2008 | 1217 | 2008 |
| Mathematics of public key cryptography SD Galbraith Cambridge University Press, 2012 | 809 | 2012 |
| Implementing the Tate pairing SD Galbraith, K Harrison, D Soldera International Algorithmic Number Theory Symposium, 324-337, 2002 | 779 | 2002 |
| Efficient pairing computation on supersingular abelian varieties PSLM Barreto, SD Galbraith, CÓ hÉigeartaigh, M Scott Designs, Codes and Cryptography 42 (3), 239-271, 2007 | 664 | 2007 |
| Supersingular curves in cryptography SD Galbraith International conference on the theory and application of cryptology and …, 2001 | 348 | 2001 |
| On the security of supersingular isogeny cryptosystems SD Galbraith, C Petit, B Shani, YB Ti International conference on the theory and application of cryptology and …, 2016 | 320 | 2016 |
| An improved compression technique for signatures based on learning with errors S Bai, SD Galbraith Cryptographers’ Track at the RSA Conference, 28-47, 2014 | 299 | 2014 |
| Identification protocols and signature schemes based on supersingular isogeny problems SD Galbraith, C Petit, J Silva International conference on the theory and application of cryptology and …, 2017 | 273 | 2017 |
| SeaSign: compact isogeny signatures from class group actions L De Feo, SD Galbraith Annual international conference on the theory and applications of …, 2019 | 260 | 2019 |
| Computing isogenies between supersingular elliptic curves over C Delfs, SD Galbraith Designs, Codes and Cryptography 78 (2), 425-440, 2016 | 226 | 2016 |
| Recent progress on the elliptic curve discrete logarithm problem SD Galbraith, P Gaudry Designs, Codes and Cryptography 78 (1), 51-72, 2016 | 198 | 2016 |
| Constructing isogenies between elliptic curves over finite fields SD Galbraith LMS Journal of Computation and Mathematics 2, 118-138, 1999 | 192 | 1999 |
| Extending the GHS Weil descent attack SD Galbraith, F Hess, NP Smart International Conference on the Theory and Applications of Cryptographic …, 2002 | 191 | 2002 |
| Pairings S Galbraith Advances in elliptic curve cryptography, 183-213, 2005 | 190 | 2005 |
| Lattice decoding attacks on binary LWE S Bai, SD Galbraith Australasian Conference on Information Security and Privacy, 322-337, 2014 | 171 | 2014 |
| Invisibility and anonymity of undeniable and confirmer signatures SD Galbraith, W Mao Cryptographers’ Track at the RSA Conference, 80-97, 2003 | 164 | 2003 |
| Sampling from discrete Gaussians for lattice-based cryptography on a constrained device NC Dwarakanath, SD Galbraith Applicable Algebra in Engineering, Communication and Computing 25 (3), 159-180, 2014 | 155 | 2014 |
| Elliptic curve Paillier schemes SD Galbraith Journal of Cryptology 15 (2), 129-138, 2002 | 149 | 2002 |
| Ordinary abelian varieties having small embedding degree SD Galbraith, JF McKee, PC Valença Finite Fields and Their Applications 13 (4), 800-814, 2007 | 146 | 2007 |
| A cryptographic application of Weil descent SD Galbraith⋆, NP Smart IMA International Conference on Cryptography and Coding, 191-200, 1999 | 142 | 1999 |