Follow
Tako Boris Fouotsa
Tako Boris Fouotsa
Postdoc, EPFL
Verified email at epfl.ch - Homepage
Title
Cited by
Cited by
Year
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
TB Fouotsa, T Moriya, C Petit
Annual International Conference on the Theory and Applications of …, 2023
562023
Séta: supersingular encryption from torsion attacks
L De Feo, C Delpech de Saint Guilhem, TB Fouotsa, P Kutas, A Leroux, ...
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
512021
Supersingular curves you can trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Annual International Conference on the Theory and Applications of …, 2023
482023
SCALLOP: scaling the CSI-FiSh
LD Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, B Wesolowski
IACR international conference on public-key cryptography, 345-375, 2023
472023
On the isogeny problem with torsion point information
TB Fouotsa, P Kutas, SP Merz, YB Ti
IACR International Conference on Public-Key Cryptography, 142-161, 2022
30*2022
Failing to hash into supersingular isogeny graphs
J Booher, R Bowden, J Doliskani, T Boris Fouotsa, SD Galbraith, ...
The Computer Journal, bxae038, 2024
282024
A new adaptive attack on SIDH
TB Fouotsa, C Petit
Cryptographers’ Track at the RSA Conference, 322-344, 2022
252022
SIDH with masked torsion point images
TB Fouotsa
Cryptology ePrint Archive, 2022
232022
New SIDH countermeasures for a more efficient key exchange
A Basso, TB Fouotsa
International Conference on the Theory and Application of Cryptology and …, 2023
182023
SimS: a simplification of SiGamal
TB Fouotsa, C Petit
International Conference on Post-Quantum Cryptography, 277-295, 2021
15*2021
SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
TB Fouotsa, C Petit
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
132021
SQIPrime: A dimension 2 variant of SQISignHD with non-smooth challenge isogenies
M Duparc, TB Fouotsa
Cryptology ePrint Archive, 2024
102024
Silbe: an updatable public key encryption scheme from lollipop attacks
M Duparc, TB Fouotsa, S Vaudenay
Cryptology ePrint Archive, 2024
52024
Isogeny problems with level structure
L De Feo, TB Fouotsa, L Panny
Annual International Conference on the Theory and Applications of …, 2024
42024
Exploring SIDH-based signature parameters
A Basso, M Chen, TB Fouotsa, P Kutas, A Laval, L Marco, GT Saah
International Conference on Applied Cryptography and Network Security, 432-456, 2024
42024
Failing to hash into supersingular isogeny graphs
C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024
Attacking trapdoors from matrix products
T Decru, TB Fouotsa, P Frixons, V Gilchrist, C Petit
Cryptology ePrint Archive, 2024
2024
Avoiding Trusted Setup in Isogeny-based Commitments
GT Saah, TB Fouotsa, E Fouotsa, C Nkuimi-Jugnia
Cryptology ePrint Archive, 2024
2024
On the design and cryptanalysis of Isogeny-Based Public Key Encryption schemes
TB Fouotsa
Universitŕ Degli Studi di Roma Tre, 2022
2022
M-SIDH and MD-SIDH
TB Fouotsa, T Moriya, C Petit
The system can't perform the operation now. Try again later.
Articles 1–20