Follow
Jason LeGrow
Jason LeGrow
Assistant Professor of Mathematics, Virginia Polytechnic Institute and State University
Verified email at vt.edu
Title
Cited by
Cited by
Year
Further optimizations of CSIDH: A systematic approach to efficient strategies, permutations, and bound vectors
A Hutchinson, J LeGrow, B Koziel, R Azarderakhsh
Applied Cryptography and Network Security: 18th International Conference …, 2020
452020
Towards isogeny-based password-authenticated key establishment
O Taraskin, V Soukharev, D Jao, JT LeGrow
Journal of Mathematical Cryptology 15 (1), 18-30, 2020
28*2020
A survey on exotic signatures for post-quantum blockchain: Challenges and research directions
M Buser, R Dowsley, M Esgin, C Gritti, S Kasra Kermanshahi, V Kuchta, ...
ACM Computing Surveys 55 (12), 1-32, 2023
272023
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
272020
A subexponential-time, polynomial quantum space algorithm for inverting the CM group action
D Jao, J LeGrow, C Leonardi, L Ruiz-Lopez
Journal of Mathematical Cryptology 14 (1), 129-138, 2020
20*2020
How not to create an isogeny-based PAKE
R Azarderakhsh, D Jao, B Koziel, JT LeGrow, V Soukharev, O Taraskin
Applied Cryptography and Network Security: 18th International Conference …, 2020
192020
Cryptanalysis of “MAKE”
DRL Brown, N Koblitz, JT LeGrow
Journal of Mathematical Cryptology 16 (1), 98-102, 2022
182022
Post-quantum security of authenticated key establishment protocols
J LeGrow
University of Waterloo, 2016
13*2016
CSI-Otter: isogeny-based (partially) blind signatures from the class group action with a twist
S Katsumata, YF Lai, JT LeGrow, L Qin
Designs, Codes and Cryptography 92 (11), 3587–3643, 2024
122024
(Short paper) Analysis of a strong fault attack on static/ephemeral CSIDH
JT LeGrow, A Hutchinson
International Workshop on Security, 216-226, 2021
11*2021
Hamiltonicity and cycle extensions in 0-block-intersection graphs of balanced incomplete block designs
JT LeGrow, DA Pike, J Poulin
Designs, Codes and Cryptography 80 (3), 421-433, 2016
42016
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
J LeGrow, YB Ti, L Zobernig
Mathematical Cryptology 3 (2), 11-23, 2023
22023
A faster method for fault attack resistance in static/ephemeral CSIDH
JT LeGrow
Journal of Cryptographic Engineering 13 (3), 283-294, 2023
22023
Design, analysis, and optimization of isogeny-based key establishment protocols
JT LeGrow
University of Waterloo, 2020
12020
Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques
T Chiu, J LeGrow, W Xiong
Proceedings of the 2024 Workshop on Attacks and Solutions in Hardware …, 2024
2024
Masking Countermeasures Against Side-Channel Attacks on Quantum Computers
J LeGrow, T Morrison, J Sikora, N Swanson
2025 Joint Mathematics Meetings (JMM 2025), 2024
2024
CSI-Otter: Isogeny-based (partially) blind signatures from the class group action with a twist
S Katsumata, YF Lai, JT LeGrow, L Qin
Annual International Cryptology Conference, 729-761, 2023
2023
Influences of some families of error-correcting codes
H Egan, JT LeGrow, GL Matthews, J Suliga
arXiv preprint arXiv:2308.01781, 2023
2023
Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies
JT LeGrow, B Koziel, R Azarderakhsh
International Conference on Science of Cyber Security, 347-366, 2023
2023
Post-Quantum Blind Signatures from Code Equivalence
V Kuchta, J LeGrow, E Persichetti
2025 Joint Mathematics Meetings (JMM 2025), 0
The system can't perform the operation now. Try again later.
Articles 1–20