Calamari and Falafl: logarithmic (linkable) ring signatures from isogenies and lattices W Beullens, S Katsumata, F Pintore International Conference on the Theory and Application of Cryptology and …, 2020 | 85 | 2020 |
Financial Cryptography and Data Security: FC 2017 International Workshops, WAHC, BITCOIN, VOTING, WTSC, and TA, Sliema, Malta, April 7, 2017, Revised Selected Papers M Brenner, K Rohloff, J Bonneau, A Miller, PYA Ryan, V Teague, ... Springer, 2017 | 30 | 2017 |
Group signatures and more from isogenies and lattices: generic, simple, and efficient W Beullens, S Dobson, S Katsumata, YF Lai, F Pintore Designs, Codes and Cryptography, 1-60, 2023 | 29 | 2023 |
Lossy CSI-FiSh: efficient signature scheme with tight reduction to decisional CSIDH-512 A El Kaafarani, S Katsumata, F Pintore IACR International Conference on Public-Key Cryptography, 157-186, 2020 | 29 | 2020 |
Efficient hash maps to on BLS curves A Budroni, F Pintore Applicable Algebra in Engineering, Communication and Computing 33 (3), 261-281, 2022 | 18 | 2022 |
Scalable ciphertext compression techniques for post-quantum KEMs and their applications S Katsumata, K Kwiatkowski, F Pintore, T Prest International Conference on the Theory and Application of Cryptology and …, 2020 | 17 | 2020 |
On the discrete logarithm problem for prime-field elliptic curves A Amadori, F Pintore, M Sala Finite Fields and Their Applications 51, 168-182, 2018 | 15 | 2018 |
On the security of the blockchain BIX protocol and certificates R Longo, F Pintore, G Rinaldo, M Sala 2017 9th International Conference on Cyber Conflict (CyCon), 1-16, 2017 | 15 | 2017 |
On random sampling of supersingular elliptic curves M Mula, N Murru, F Pintore Cryptology ePrint Archive, 2022 | 11 | 2022 |
Collisions in supersingular isogeny graphs and the SIDH-based identification protocol W Ghantous, S Katsumata, F Pintore, M Veroni Cryptology ePrint Archive, 2021 | 8 | 2021 |
Group signatures and more from isogenies and lattices: Generic, simple W Beullens, S Dobson, S Katsumata, YF Lai, F Pintore and efficient. Cryptology ePrint Archive, 2021 | 5 | 2021 |
Financial Cryptography and Data Security: FC 2019 International Workshops, VOTING and WTSC, St. Kitts, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers A Bracciali, J Clark, F Pintore, PB Rønne, M Sala Springer Nature, 2020 | 4 | 2020 |
Binary quadratic forms, elliptic curves and Schoof's algorithm F Pintore Università degli studi di Trento, 2015 | 3 | 2015 |
Efficiency of SIDH-based signatures (yes, SIDH) W Ghantous, F Pintore, M Veroni Cryptology ePrint Archive, 2023 | 1 | 2023 |
Efficient hash maps to A Budroni, F Pintore | 1 | 2020 |
Hashing to G2 on BLS pairing-friendly curves A Budroni, F Pintore ACM Communications in Computer Algebra 52 (3), 63-66, 2019 | 1 | 2019 |
Financial Cryptography and Data Security: FC 2018 International Workshops, BITCOIN, VOTING, and WTSC, Nieuwpoort, Curaçao, March 2, 2018, Revised Selected Papers A Zohar, I Eyal, V Teague, J Clark, A Bracciali, F Pintore, M Sala Springer, 2019 | 1 | 2019 |
A review of mathematical and computational aspects of CSIDH algorithms L Maino, M Mula, F Pintore Journal of Algebra and Its Applications, 2530002, 2023 | | 2023 |
A multistep strategy for polynomial system solving over finite fields and a new algebraic attack on the stream cipher Trivium R La Scala, F Pintore, SK Tiwari, A Visconti arXiv preprint arXiv:2304.07820, 2023 | | 2023 |
A new isogeny-based lossy identification protocol for a tightly secure digital signature F Pintore Aracne, 2021 | | 2021 |