Steven Galbraith Publications
New Papers and Preprints
Books/Edited Volumes
- Steven D. Galbraith,
Topics in Cryptology – CT-RSA 2022,
Cryptographers’ Track at the RSA Conference 2022, Virtual Event, March 1–2, 2022, Proceedings,
Springer LNCS 13161, 2022.
- Steven D. Galbraith,
ANTS XIV: Proceedings of the Fourteenth Algorithmic Number Theory Symposium, MSP, 2020.
-
Steven D. Galbraith, Shiho Moriai.
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Parts I, II, III. Lecture Notes in Computer Science volumes 11921, 11922, 11923, Springer 2019.
- Steven D. Galbraith, Giovanni Russello, Willy Susilo, Dieter Gollmann, Engin Kirda, Zhenkai Liang.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019. ACM 2019.
- Thomas Peyrin and Steven D. Galbraith,
Advances in Cryptology – ASIACRYPT 2018.
Parts I, II and III in
Springer Lecture Notes in Computer Science volumes 11272, 11273, 11274 (2018).
- S. D. Galbraith and M. Nandi (eds.), INDOCRYPT 2012,
Springer LNCS 7668, 2012.
- S. D. Galbraith, Mathematics of public key
cryptography, Cambridge University Press, April 2012.
-
S. D. Galbraith and
K. G. Paterson (eds), Pairing 2008,
Springer LNCS 5209, 2008.
- S. D. Galbraith,
Proceedings of the 11th IMA International Conference
on Cryptography and Coding,
Springer LNCS 4887, 2007.
Refereed Publications
2024
97. Jeremy Booher, Ross Bowden, Javad Doliskani, Tako Boris Fouotsa, Steven D Galbraith, Sabrina Kunzweiler, Simon-Philipp Merz, Christophe Petit, Benjamin Smith, Katherine E Stange, Yan Bo Ti, Christelle Vincent, José Felipe Voloch, Charlotte Weitkämper, Lukas Zobernig, Failing to Hash Into Supersingular Isogeny Graphs, The Computer Journal, 2024, bxae038.
Eprint version.
96. Steven D. Galbraith, Yi-Fu Lai, Hart Montgomery, A Simpler and More Efficient Reduction of DLog to CDH for Abelian Group Actions, in Q. Tang and V. Teague (eds.), PKC 2024, Springer LNCS 14603 (2024) 36--60.
See: Extended version.
95. Steven D. Galbraith and Trey Li, Obfuscation of evasive algebraic set membership,
Advances in Mathematics of Communications, 2024.
94. Shalini Banerjee, Steven D. Galbraith, and Giovanni Russello, Obfuscating Evasive Decision Trees,
A. Chattopadhyay et al. (Eds.): INDOCRYPT 2023, LNCS 14460, pp. 84--104, 2024.
2023
93. Shalini Banerjee, Steven D. Galbraith, Tariq Khan, John H. Castellanos and Giovanni Russello. Preventing Reverse Engineering of Control Programs in Industrial Control Systems. Proceedings of the 9th ACM Cyber-Physical System Security Workshop, CPSS 2023, ACM, p. 48–59.
92. Ward Beullens, Luca De Feo, Steven D. Galbraith, and Christophe Petit.
Proving knowledge of isogenies: A survey,
In Special Issue of Designs,Codes and Cryptography on ZK proofs. (2023)
2022
91. Luca De Feo, Samuel Dobson, Steven D. Galbraith, Lukas Zobernig, SIDH Proof of Knowledge, in Shweta Agrawal and Dongdai Lin (eds), ASIACRYPT 2022, Springer LNCS 13792, 2022.
eprint 2021/1023
90. Steven D. Galbraith and Yi-Fu Lai, Attack on SHealS and HealS: the Second Wave of GPST,
in J. H. Cheon and T. Johansson (eds.), Post-Quantum Cryptography PQCrypto 2022, Springer LNCS 13512 (2022) 399-421.
eprint 2022/443
89. Samuel Dobson and Steven D. Galbraith, Post-Quantum Signal Key Agreement with SIDH,
in J. H. Cheon and T. Johansson (eds.), Post-Quantum Cryptography PQCrypto 2022, Springer LNCS 13512 (2022) 422-450.
eprint 2021/1187
2021
88. Samuel Dobson, Steven D. Galbraith and Ben Smith,
Trustless unknown-order groups, Mathematical Cryptology, 1(2) (2021) 25--39.
eprint 2020/196.
Presented at Mathcrypt 2021.
87. Steven D. Galbraith and Trey Li,
Small Superset and Big Subset Obfuscation,
in ACISP 2021, Springer LNCS 13083, 68-87.
eprint 2020/1018.
86. Yi-Fu Lai, Steven D. Galbraith and Cyprien Delpech de Saint Guilhem, Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer,
in A. Canteaut and F.-X. Standaert (eds.), EUROCRYPT 2021,
Springer LNCS 12696 (2021), pages 213--241.
eprint 2020/1012
85. Steven Galbraith and Lorenz Panny and Benjamin Smith and Frederik Vercauteren,
Quantum Equivalence of the DLP and CDHP for Group Actions, Mathematical Cryptology, Vol. 1, No. 1 (2021) p. 40--44.
eprint version.
84. Shujie Cui, Xiangfu Song, Muhammad Rizwan Asghar, Steven D. Galbraith and Giovanni Russello. Privacy-preserving Dynamic Symmetric Searchable Encryption with Controllable Leakage. ACM Trans. Priv. Secur. 24(3): 18:1-18:35 (2021)
2020
83. Raphael C.-W. Phan et al, Advances in Security Research in the Asiacrypt Region, Communications of the ACM, April 2020, vol. 63, no. 4.
82. Steven D. Galbraith, Robert Granger, Simon-Philipp Merz and Christophe Petit, On Index Calculus Algorithms for Subfield Curves, in Selected Areas in Cryptography (SAC) 2020, Springer LNCS 12804 (2020) 115--138.
81. Steven D. Galbraith and Lukas Zobernig, Obfuscating Finite Automata, in Selected Areas in Cryptography (SAC) 2020, Springer LNCS 12804 (2020) 90--114.
eprint version.
80. Muhammad Rizwan Asghar, Steven D. Galbraith, Andrea Lanzi, Giovanni Russello and Lukas Zobernig, Towards a Theory of Special-purpose Program Obfuscation (full version), arXiv:2011.02607, 2020.
Short version in G. Wang, R. K. L. Ko, Md. Z. A. Bhuiyan and Y. Pan (eds.), 19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, IEEE, pages 394--401 (2020)
79. Samuel Dobson, Steven D. Galbraith, Jason LeGrow, Yan Bo Ti and Lukas Zobernig, An Adaptive Attack on 2-SIDH, International Journal of Computer Mathematics: Computer Systems Theory, Volume 6, Issue 4, pages 386-403, 2021.
eprint version.
This article was erroneously published in Volume 5, issue 4. The article has been republished as part of the special issue “Mathematics of Cryptography and Coding in the Quantum Era” with citation details as follows:
Volume 6, Issue 4, pages 386–403.
See this correction notice.
78. Léo Ducas, Steven D. Galbraith, Thomas Prest and Yang Yu, Integral Matrix Gram Root and Lattice Gaussian Sampling Without Floats, in A. Canteaut and Y. Ishai (eds), EUROCRYPT 2020, Springer Lecture Notes in Computer Science, vol 12106 (2020) pp. 608--637. eprint.
77. Steven D. Galbraith, Christophe Petit and Javier Silva,
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems, Journal of Cryptology, Volume 33, Issue 1 (2020) 130--175.
2019
76. Steven D. Galbraith and Lukas Zobernig,
Obfuscated Fuzzy Hamming Distance and Conjunctions from Subset Product Problems,
in D. Hofheinz and A. Rosen (eds.), Theory of Cryptography TCC (1), Springer LNCS 11891 (2019) 81--110.
75. Lukas Zobernig and Steven D. Galbraith and Giovanni Russello, When Are Opaque Predicates Useful?.
in TrustCom/BigDataSE 2019, IEEE, 2019. pages 168--175.
74. Steven D. Galbraith, Jake Massimo and Kenneth G. Paterson, Safety in Numbers: On the Need for Robust Diffie-Hellman Parameter Validation, in Dongdai Lin and Kazue Sako (eds.), Public-Key Cryptography (PKC 2019), Springer LNCS 11443 (2019) 379--407.
eprint.
73. Luca de Feo and Steven D. Galbraith,
SeaSign: Compact isogeny signatures from class group actions,
in Yuval Ishai and Vincent Rijmen (eds.), EUROCRYPT (3) Springer LNCS 11478 (2019) 759--789.
72. Shi Bai, Steven D. Galbraith, Liangze Li and Daniel Sheffield,
Improved Exponential-time Algorithms for Inhomogeneous-SIS,
Journal of Cryptology, Volume 32, Issue 1 (2019) 35--83.
2018
71. Steven D. Galbraith, Joel Laity and Barak Shani, Finding Significant Fourier Coefficients: Clarifications, Simplifications, Applications and Limitations,
Chicago Journal of Theoretical Computer Science, Volume 2018, Article 6, December 20, 2018.
70. Steven D. Galbraith and Frederik Vercauteren, Computational problems in supersingular elliptic curve isogenies,
in Quantum Information Processing, 17:256 (2018).
eprint 2017/774.
2017
69. Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith and Giovanni Russello,
ObliviousDB: Practical and Efficient Searchable Encryption with Controllable Leakage,
in A. Imine, J. M. Fernandez, J.-Y. Marion, L. Logrippo and J. Garcia-Alfaro (eds.), Proceedings of FPS 2017 (10th International Symposium on Foundations & Practice of Security),
Springer LNCS 10723 (2017) 189--205.
68. Steven D. Galbraith, Christophe Petit and Javier Silva, Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems, in T. Takagi and T. Peyrin (eds), ASIACRYPT 2017, Springer LNCS 10624 (2017) 3--33.
Full version: Cryptology ePrint Archive: Report 2016/1154.
Best paper award at ASIACRYPT.
67. Steven D. Galbraith, Ping Wang and Fangguo Zhang, Computing Elliptic Curve Discrete Logarithms with Improved Baby-step Giant-step Algorithm,
Advances in Mathematics of Communications (AMC), Volume 11, Issue 3 (2017) 453-469.
eprint/2015/605.
66. Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith and Giovanni Russello, Secure and Practical Searchable Encryption: A Position Paper, ACISP 2017, Springer LNCS 10342, 266-281.
65. Shujie Cui, Muhammad Rizwan Asghar, Steven D. Galbraith and Giovanni Russello, P-McDb: Privacy-preserving Search using Multi-cloud Encrypted Databases, 10th International Conference on Cloud Computing (CLOUD), IEEE (2017) 334-341.
2016
64. Steven D. Galbraith, C. Petit, B. Shani and Yan Bo Ti, On the Security of Supersingular Isogeny Cryptosystems, in J. H. Cheon and T. Takagi (eds),
ASIACRYPT 2016, Springer LNCS 10031 (2016) 63-91.
eprint 2016/859
63. Zengpeng Li, Steven D. Galbraith and Chunguang Ma, Preventing Adaptive Key Recovery Attacks on the GSW Levelled Homomorphic Encryption Scheme, in Liqun Chen and Jinguang Han (eds), Proceedings Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016. Springer LNCS 10005 (2016) 373-383.
Extended full version eprint 2016/1146
62. Steven D. Galbraith, Shishay W. Gebregiyorgis and Sean Murphy, Algorithms for the Approximate Common Divisor Problem, LMS J. Comput. Math. 19 (Special issue A) (2016) 58-72.
Full version on eprint.
61. Christina Delfs and Steven D. Galbraith, Computing isogenies between supersingular elliptic curves over F_p,
Designs, Codes and Cryptography, Volume 78, Issue 2 (2016) 425-440.
arXiv:1310.7789
60. Steven D. Galbraith and Pierrick Gaudry, Recent progress on the elliptic curve discrete logarithm problem, Designs, Codes and Cryptography, Volume 78, Issue 1 (2016) 51-72.
Also see eprint 2015/1022.
2015
59. Steven D. Galbraith, Eduardo Morais and Ricardo Dahab, Adaptive key recovery attacks on NTRU-based somewhat homomorphic encryption schemes, in A. Lehmann and S. Wolf (eds), 8th International Conference on Information-Theoretic Security (ICITS), Springer LNCS 9063 (2015) 283-296.
58. Steven D. Galbraith and Barak Shani, The Multivariate Hidden Number Problem, in A. Lehmann and S. Wolf (eds), 8th International Conference on Information-Theoretic Security (ICITS), Springer LNCS 9063 (2015) 250-268.
2014
57. Steven D. Galbraith and Shishay W. Gebregiyorgis,
Summation polynomial algorithms for elliptic curves in characteristic two,
in W. Meier and D. Mukhopadhyay (eds), INDOCRYPT 2014, Springer LNCS 8885 (2014) 409-427.
eprint 2014/086
56. Ilya Chevyrev and Steven D. Galbraith, Constructing supersingular elliptic curves with a given endomorphism ring,
LMS Journal of Computation and Mathematics, Volume 17, Special Issue A (2014) 71-91.
Early version: Distinguishing Maximal Orders of Quaternion Algebras by their Short Elements, arXiv:1301.6875
55. Shi Bai and Steven D. Galbraith, Lattice Decoding Attacks on Binary LWE,
in W. Susilo and Y. Mu (eds.), ACISP 2014, Springer LNCS 8544 (2014) 322-337.
Also see: eprint 2013/0839.
54. Nagarjun C. Dwarakanath and Steven D. Galbraith, Efficient sampling from discrete Gaussians for lattice-based cryptography on a constrained device. Applicable Algebra in Engineering, Communication and Computing,
Volume 25, Issue 3 (2014) 159-180.
The final publication is available at Springer via http://link.springer.com/article/10.1007/s00200-014-0218-3.
53. Shi Bai and Steven D. Galbraith, An Improved Compression Technique for Signatures Based on Learning with Errors,
in J. Benaloh (Ed.), CT-RSA 2014, LNCS 8366 (2014) 28-47.
eprint 2013/838
2013
52. S. D. Galbraith and Chang-An Zhao, Self-pairings on hyperelliptic curves,
Journal of Mathematical Cryptology, Volume 7, Issue 1 (2013) 31-42.
There is an erratum to this paper. But it is correcting an error by the journal, not an error by us.
51. S. D. Galbraith and Anton Stolbunov, Improved algorithm for the isogeny problem for ordinary elliptic curves, Applicable Algebra in Engineering, Communication and Computing, Vol. 24, No. 2 (2013) 107-131.
arxiv version
50. S. D. Galbraith, John M. Pollard and Raminder S. Ruprai,
Computing discrete logarithms in an interval,
Math. Comp., 82, No. 282 (2013) 1181-1195.
eprint 2010/617.
2012
49. Steven D. Galbraith and Mark Holmes, A non-uniform birthday problem with
applications to discrete logarithms,
Discrete Applied Mathematics Vol. 160, No. 10-11 (2012) 1547-1560.
eprint 2010/616.
2011
48. Roberto Avanzi, Waldyr D. Benits Jr., Steven D. Galbraith and James McKee,
On the distribution of the coefficients of normal forms for Frobenius Expansions,
Designs, Codes and Cryptography,
Volume 61, Number 1 (2011) 71-89.
47.
Philip N. J. Eagle, Steven D. Galbraith and John Ong,
Point compression for Koblitz curves,
Advances in Mathematics of Communication, Volume 5, Number 1 (2011) 1-10.
Early version:
P. N. J. Eagle and S. D. Galbraith,
Point Compression for Koblitz Elliptic Curves,
eprint 2009/086.
46. Steven D. Galbraith, Xibin Lin and Michael Scott,
Endomorphisms for Faster Elliptic Curve Cryptography on a Large Class of Curves,
Journal of Cryptology,
Volume 24, Number 3 (2011) 446-469.
Also available as: eprint 2008/194
2010
45. S. D. Galbraith and R. S. Ruprai,
Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval,
in P. Nguyen and D. Pointcheval (eds.), PKC 2010, Springer LNCS 6056 (2010)
368-383.
Full version:
eprint 2010/615.
2009
44. S. D. Galbraith and R. S. Ruprai,
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems,
in M. Parker (ed.),
Twelfth IMA International Conference on Cryptography and Coding,
Cirencester, Springer LNCS 5921 (2009) 368-382.
Full version: pdf
43. S. D. Galbraith and X. Lin,
Computing Pairings Using x-Coordinates Only,
Designs,
Codes and Cryptography, Vol. 50, No. 3
(2009) 305-324.
Early version: eprint 2008/019.
42. S. D. Galbraith, X. Lin and M. Scott,
Endomorphisms for faster elliptic curve cryptography on general curves,
in A. Joux (ed.), EUROCRYPT 2009,
Springer LNCS 5479 (2009) 518-535.
41. S. D. Galbraith, J. Pujolas, C. Ritzenthaler
and B. A. Smith,
Distortion maps for genus two curves,
Journal of Mathematical Cryptology, Volume 3, Issue 1 (2009) 1-18.
Preprint version: arxiv math.NT/0611471.
Much earlier version:
S. D. Galbraith and J. Pujolas,
Distortion maps for genus two curves,
in R. Cramer and T. Okamoto (eds.), Proceedings of a workshop on
Mathematical Problems and Techniques in Cryptology,
CRM Barcelona (2005) 46-58.
2008
40. S. D. Galbraith and E. R. Verheul,
An analysis of the vector decomposition problem,
in R. Cramer (ed), PKC 2008,
Springer LNCS 4939
(2008) 308-327.
Full version
39. S. D. Galbraith, X. Lin and D. J. Mireles,
Pairings on hyperelliptic curves with a real model,
in S. D. Galbraith and K. G. Paterson (eds), Pairing 2008,
Springer LNCS 5209 (2008) 265-281.
Early version: eprint 2008/250
38. W. D. Benits Jr. and S. D. Galbraith,
The GPS identification scheme using Frobenius expansions,
in S. Lucks, A.-R. Sadeghi and C. Wolf (eds.),
Research in Cryptology, Proceedings of the
Second Western European Workshop, WEWoRC 2007, Bochum, Germany,
Springer
LNCS 4945
(2008) 13-27.
37. S. D. Galbraith and M. Scott,
Exponentiation in pairing-friendly groups using homomorphisms,
in S. D. Galbraith and K. G. Paterson (eds), Pairing 2008,
Springer LNCS 5209 (2008) 211-224.
Early version: eprint 2008/117
36. S. D. Galbraith, M. Harrison and D. Mireles,
Efficient Hyperelliptic Arithmetic
using Balanced Representation for Divisors,
in A. J. van der Poorten and A. Stein (eds.), ANTS 2008,
Springer LNCS 5011 (2008) 342-356.
Journal link
Full version: pdf.
Biographical Note: My PhD student Dave worked this out, but then we found out that Mike
had already discovered it and implemented it in Magma, but had never got around to writing it up.
35. S. D. Galbraith, K. G. Paterson and N. P. Smart,
Pairings for cryptographers,
Discrete Applied Mathematics,
Volume 156, Issue 16 (2008) 3113-3121
Journal link:
doi:10.1016/j.dam.2007.12.010
Early version: eprint 2006/165.
Biographical note: The original title of this paper was "pairings for dummies".
34. S. D. Galbraith, F. Hess and F. Vercauteren,
Aspects of pairing inversion,
IEEE Trans. Information Theory,
Volume 54, Issue 12 (2008) 5719-5728.
Early version: eprint 2007/256.
Errata: Igor Shparlinski pointed out (January 12, 2010) that the proof of Lemma 15 is not complete. One would need to show there are families consisting of pairs (r,q) which are prime.
2007
33. S. D. Galbraith, F. Hess and F. Vercauteren,
Hyperelliptic pairings,
in T. Takagi et al (eds), Pairing 2007,
Springer LNCS 4575 (2007) 108-131.
Full version: pdf.
32. S. D. Galbraith, C. O hEigeartaigh, C. Sheedy,
Simplified pairing computation and security implications,
J. Mathematical Crypt, Vol. 1, No. 3 (2007) 267-281.
Early version: eprint 2006/169.
31. W. D. Benits Jr. and S. D. Galbraith,
Constructing pairing-friendly elliptic curves
using Groebner basis reduction,
in S. D. Galbraith (ed.),
Cryptography and Coding, Springer LNCS 4887
(2007) 336-345.
30. S. D. Galbraith, J. McKee and P. Valença,
Ordinary abelian varieties having small embedding degree,
Finite Fields and Their Applications, 13 (2007) 800-814.
Early version:
eprint 2004/365.
The early version was also printed as:
S. D. Galbraith, J. McKee and P. Valença,
Ordinary abelian varieties having small embedding degree,
in R. Cramer and T. Okamoto (eds.), Proceedings of a workshop on
Mathematical Problems and Techniques in Cryptology,
CRM Barcelona (2005) 29-45.
29. P. S. L. M. Barreto, S. D. Galbraith, C. O'hEigeartaigh and M. Scott,
Efficient Pairing Computation on Supersingular Abelian Varieties,
Designs, Codes and Cryptography, Vol. 42, No. 3 (2007) 239-271.
Online.
Earlier version:
eprint 2004/375.
Biographical Note: We worked on this paper for a very long time, and it got bigger and bigger.
2006
28. S. R. Blackburn, C. Cid and S. D. Galbraith,
Cryptanalysis of a Cryptosystem based on Drinfeld modules,
IEE Proceedings Information Security, Vol. 153, No. 1 (2006) 12-14.
Earlier version:
eprint 2003/223.
27. A. W. Dent and S. D. Galbraith,
Hidden Pairings and Trapdoor DDH Groups,
in F. Hess, S. Pauli and M. Pohst (eds.), ANTS-VII,
Springer LNCS 4076 (2006) 436-451.
2005
26. S. D. Galbraith, Pairings,
Chapter IX of book
Advances
in elliptic curve cryptography
edited by I. Blake, G. Seroussi and N. Smart,
Cambridge University Press, 2005.
25. S. D. Galbraith, C. Heneghan and J. McKee,
Tunable balancing of RSA,
in C. Boyd and J. M. Gonzalez Nieto (eds.), ACISP 2005,
Springer LNCS 3574 (2005) 280-292.
Publisher's
link
Full version:
pdf.
For cryptanalysis also see:
D. Bleichenbacher and A. May,
New attacks on RSA with small secret CRT-exponents,
PKC 2006, Springer LNCS 3958.
24. S. D. Galbraith and A. Menezes,
Algebraic curves and cryptography,
Finite Fields and Applications,
Volume 11, Issue 3 (2005) 544-577.
Earlier version:
CACR Technical report 2005/2.
23. S. D. Galbraith and J. F. McKee,
Pairings on elliptic curves over finite commutative rings,
in N. P. Smart (ed.), Cryptography and Coding: 10th IMA International
Conference, Cirencester, UK, Springer LNCS 3796 (2005)
392-409.
Journal link
Full version:
pdf.
2004
22. S. D. Galbraith, H. Hopkins and I. Shparlinski,
Secure Bilinear Diffie-Hellman Bits,
in H. Wang, J. Pieprzyk and V. Varadharajan (eds.),
ACISP 2004, Springer LNCS 3108 (2004) 370-378.
Earlier version:
eprint 2002/155.
21. S. D. Galbraith and V. Rotger,
Easy decision Diffie-Hellman groups,
LMS
J. Comput. Math. 7 (2004) 201-218.
Early draft version.
Slides from a survey of
this work presented in August 2004
at Chuo University, Tokyo.
Biographical Note: I lectured on these questions in Spain, and Victor was in the
audience. He had some ideas which we worked on for some months by email.
2003
20. S. D. Galbraith and W. Mao,
Invisibility and anonymity of undeniable and confirmer signatures,
in M. Joye (ed.) Topics in Cryptology CT-RSA 2003,
Springer LNCS
2612 (2003) 80-97.
Full version.
Early version:
Anonymity and denial of undeniable and confirmer signatures,
HP Labs technical report
HPL-2001-303 (2001).
19. S. D. Galbraith,
Weil descent of Jacobians,
Discrete Applied Mathematics Vol. 128, Issue 1, (2003) 165-180.
Electronic Journal link
Full version.
Conference version published as:
S. D. Galbraith, Weil descent of Jacobians,
in D. Augot and C. Carlet (eds.), WCC2001,
Elsevier,
Electron. Notes Discrete Math. 6 (2001).
2002
18. S. D. Galbraith, W. Mao, K. G. Paterson,
RSA-based undeniable signatures for
general moduli,
in B. Preneel (ed.), Topics in Cryptology - CT-RSA 2002,
Springer LNCS
2271, p. 200-217 (2002)
Full version.
Preliminary version: HP
Labs technical report HPL-2001-304,
17. S. D. Galbraith, F. Hess, N. P. Smart,
Extending the GHS Weil descent attack,
in L. Knudsen (ed.), EUROCRYPT 2002,
Springer LNCS
2332 (2002) 29-44.
16. S. D. Galbraith, Elliptic curve Paillier schemes,
Journal
of Cryptology, Vol. 15, No. 2 (2002) 129-138.
Full version.
Note: This paper contains the work of both of the preprints
`Cryptanalysis of some elliptic curve based
cryptosystems of Paillier'
and `An elliptic curve Paillier scheme'.
Biographical Note: This has always been one of my favourite papers. I think because
I learnt a lot about formal groups from writing it.
15. S. D. Galbraith, J. Malone-Lee, N. P. Smart,
Public key signatures in the multi-user setting,
Information Processing Letters,
Volume 83, Issue 5 (2002) 263-266.
Journal link.
14. S. D. Galbraith, K. Harrison and D. Soldera,
Implementing the Tate pairing, in C. Fieker and D. Kohel (eds.),
ANTS-V,
Springer LNCS
2369 (2002) 324-337.
ANTS slides.
Preliminary version:
Hewlett-Packard laboratories technical report HPL-2002-23.
Biographical Note: This was a race with Barreto-Kim-Lynn-Scott. But we are all friends now.
13. S. D. Galbraith, Rational points on X0+(N) and
quadratic Q-curves,
J. de la Theorie des Nombres de Bordeaux, 14
(2002) 205-219.
Full version: pdf.
Biographical Note: This paper comes out of my thesis, many years later.
Some of the computations were extremely difficult to perform.
12. S. D. Galbraith, S. Paulus, N. P. Smart,
Arithmetic on superelliptic curves,
Mathematics of Computation
71, No. 237 (2002) 393-405.
Preliminary Version:
Hewlett-Packard Labs
technical report HPL-98-179 (1998).
Biographical Note: This paper took a very very long time to be published.
2001
11. S. D. Galbraith,
Supersingular curves in cryptography,
in C. Boyd (ed.) ASIACRYPT 2001,
Springer LNCS 2248
(2001) 495-513.
Asiacrypt slides.
Full version: pdf.
Biographical Note: Parts of this paper were once rejected for being "well-known", but now
it is one of my most-cited papers.
10. S. D. Galbraith, Limitations of
constructive Weil descent,
in Alster, Kazimierz (ed.) et al.,
Public-Key Cryptography and Computational Number Theory
September 11-15, 2000, Warsaw, Poland,
Walter de Gruyter (2001) 59-70.
Full version: ps.
2000
9. S. R. Blackburn, S. D. Galbraith,
Certification of secure RSA keys,
Electronics Letters, Vol. 36, No. 1, p. 29-30 (2000)
Full Version: University of Waterloo
technical report CORR 99-44 (1999)
8. S. D. Galbraith, J. F. McKee,
The probability that the number of points on an elliptic curve
over a finite field is prime,
Journal of the London Mathematical Society, 62,
no. 3, p. 671-684 (2000)
Full version: pdf.
Preliminary version: University of Waterloo
technical report CORR 99-51 (1999)
7. S. D. Galbraith, On the efficiency of elliptic curves
arising in French literature,
In Journal
of Craptology (2000).
Biographical Note: Of course, I am very proud of this paper.
1999
6. S. D. Galbraith, N. P. Smart,
A cryptographic application of Weil descent,
in Codes and Cryptography, Cirencester,
Springer LNCS
1746, p. 191-200 (1999)
Preliminary version:
Hewlett-Packard Labs technical report HPL-1999-70 (1999).
5. S. R. Blackburn, M. Burmester, S. Blake-Wilson, S. D. Galbraith,
Weaknesses in shared RSA key generation,
in Codes and Cryptography, Cirencester,
Springer LNCS 1746, p. 300-306 (1999)
4. S. R. Blackburn, S. D. Galbraith,
Cryptanalysis of two cryptosystems based on group actions,
ASIACRYPT'99,
Springer LNCS
1716, p. 52-61 (1999)
3. S. D. Galbraith, Constructing isogenies between elliptic curves over finite
fields,
London Math. Soc.,
Journal of Computational Mathematics, Vol. 2 (1999)
p. 118-138.
Full version: pdf.
2. S. D. Galbraith, Rational points on X0+(p),
Experimental
Math., 8, No. 4, p. 311-318 (1999)
Biographical Note: This paper comes from my PhD thesis. It took a long time to
get written up properly and published.
1. S. D. Galbraith, Elliptic curve public key cryptography,
Mathematics Today, 35, No. 3, p. 76-79 (1999)
Biographical Note: This was a survey paper with no interesting content.
I hope no-one reads it now.
Old Preprints and Technical Reports
- S. Blackburn, S. Blake-Wilson, M. Burmester, S. Galbraith,
Shared generation of shared RSA keys,
University of Waterloo technical report CORR 98-19 (1998)
- S. D. Galbraith,
The Weil pairing on elliptic curves over C,
preprint (2005).
- S. Galbraith, W. Mao, K. G. Paterson,
A cautionary note regarding cryptographic protocols
based on composite integers,
HP
labs technical report HPL-2001-284.
- S. D. Galbraith,
Disguising tori and elliptic curves,
eprint 2006/248.
- S. D. Galbraith and B. A. Smith,
Discrete Logarithms in Generalized Jacobians,
arxiv math.NT/0610073.
- W. Castryck, S. D. Galbraith and R. Rezaeian Farashahi,
Efficient arithmetic on elliptic curves using a mixed
Edwards-Montgomery representation,
eprint 2008/218.
- S. D. Galbraith, Space-efficient variants of cryptosystems based on learning with errors, 2012.
- Samuel Dobson and Steven D. Galbraith, On the Degree-Insensitive SI-GDH problem and assumption.
- Steven D. Galbraith, Authenticated key exchange for SIDH, eprint 2018/266.
- Muhammad Rizwan Asghar, Steven D. Galbraith and Giovanni Russello, Obfuscation through simplicity, preprint, 2016.
Back
Last Modified: 2-7-2024