Jason LeGrow
Jason LeGrow
Assistant Professor of Mathematics, Virginia Polytechnic Institute and State University
Verified email at
Cited by
Cited by
Further optimizations of CSIDH: a systematic approach to efficient strategies, permutations, and bound vectors
A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh
Applied Cryptography and Network Security: 18th International Conference†…, 2020
Towards isogeny-based password-authenticated key establishment
O Taraskin, V Soukharev, D Jao, JT LeGrow
Journal of Mathematical Cryptology 15 (1), 18-30, 2020
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4†…, 2020
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez
Journal of Mathematical Cryptology 14 (1), 129-138, 2020
Cryptanalysis of “MAKE”
DRL Brown, N Koblitz, JT LeGrow
Journal of Mathematical Cryptology 16 (1), 98-102, 2022
How not to create an isogeny-based PAKE
R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin
Applied Cryptography and Network Security: 18th International Conference†…, 2020
Post-quantum security of authenticated key establishment protocols
J LeGrow
University of Waterloo, 2016
: Isogeny-Based (Partially) Blind Signatures from†the†Class Group Action with†a†Twist
S Katsumata, YF Lai, JT LeGrow, L Qin
Annual International Cryptology Conference, 729-761, 2023
(Short Paper) analysis of a strong fault attack on static/ephemeral CSIDH
JT LeGrow, A Hutchinson
International Workshop on Security, 216-226, 2021
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs
JT LeGrow, DA Pike, J Poulin
Designs, Codes and Cryptography 80 (3), 421-433, 2016
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
J LeGrow, YB Ti, L Zobernig
Mathematical Cryptology 3 (2), 11-23, 2023
Design, analysis, and optimization of isogeny-based key establishment protocols
JT LeGrow
University of Waterloo, 2020
A faster method for fault attack resistance in static/ephemeral CSIDH
JT LeGrow
Journal of Cryptographic Engineering 13 (3), 283-294, 2023
Influences of some families of error-correcting codes
H Egan, JT LeGrow, GL Matthews, J Suliga
arXiv preprint arXiv:2308.01781, 2023
Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies
JT LeGrow, B Koziel, R Azarderakhsh
International Conference on Science of Cyber Security, 347-366, 2023
The system can't perform the operation now. Try again later.
Articles 1–16