Research

My current research is in post-quantum cryptography. In particular I am interested in new post-quantum primitives; realizing classical cryptosystems over post-quantum primitives; protocols; efficient implementations; and quantum cryptanalysis. I have worked primarily on isogeny-based schemes built on the ideas underlying SIKE and CSIDH, and I am now also working on protocols built from other group actions, like LESS and MEDS. In the past, I have worked on combinatorial design theory, particularly on configuration orderings of balanced incomplete block designs.

Journal Articles

  1. Duality Lower Bouds for the Cost of Group Action Evaluation in CSIDH, with Veronika Kuchta, Hiram Lopez and Gretchen Matthews. To appear in Transactions on Mathematical Cryptology.

  2. Towards IOPPs from Folded Reed-Solomon Codes, with Veronika Kuchta, Hiram Lopez and Gretchen Matthews. To appear in Transactions on Mathematical Cryptology.

  3. Influences of Some Families of Error-Correcting Codes, with Hailey Egan, Gretchen L. Matthews, and Jeff Suliga. Involve, a Journal of Mathematics (2025).

  4. CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist, with Shuichi Katsumata, Yi-Fu Lai, and Ling Qin. Designs, Codes, and Cryptography (2024).

  5. Supersingular Non-Superspecial Abelian Surfaces in Cryptography, with Yan Bo Ti and Lukas Zobernig. Mathematical Cryptology vol. 3, no. 2 (2023), pp. 11-23.

  6. A Faster Method for Fault Attack Resistance in Static/Ephemeral CSIDH. Journal of Cryptographic Engineering vol. 13, no. 3 (2023), pp. 283-294.

  7. A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges and Research Directions with Maxime Buser, Rafael Dowsley, Muhammed Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph Liu, Raphaël Phan, Amin Sakzad, Ron Steinfeld, and Jiangshan Yu. ACM Computing Surveys, vol. 55, no. 12 (2023), pp. 1-32.

  8. Cryptanalysis of "MAKE", with Daniel R. L. Brown and Neal Koblitz. Journal of Mathematical Cryptology, vol. 16, no. 1 (2022), pp. 98-102.

  9. An Adaptive Attack on 2-SIDH, with Samuel Dobson, Steven D. Galbraith, Yan Bo Ti, and Lukas Zobernig. International Journal of Computer Mathematics: Computer Systems Theory, vol. 5, no. 4 (2021), pp. 282-299

  10. Towards Isogeny-Based Password Authenticated Key Establishment, with Vladimir Soukharev, Oleg Taraskin, and David Jao. Journal of Mathematical Cryptology vol. 15 no. 1 (2021), pp. 18-30.

  11. A Subexponential-Time, Polynomial Quantum Space Algorithm for Inverting the CM Action, with David Jao, Christopher Leonardi, and Luis Ruiz-Lopez. Journal of Mathematical Cryptology vol. 14 no. 1 (2020), pp. 129-138.

  12. Hamiltonicity and Cycle Extensions in 0-Block-Intersection Graphs of Balanced Incomplete Block Designs, with David A. Pike and Jonathan Poulin. Designs, Codes, and Cryptography vol. 80, no. 3 (2016), pp. 421–433.

Refereed Conference Proceedings

  1. Practical Fault Injection Attacks on Constant Time CSIDH and Mitigation Techniques, with Tinghung Chiu and Wenjie Xiong. Proceedings of the Eighth Workshop on Attacks and Solutions in Hardware Security (ASHES 24).

  2. Masking Countermeasures Against Side-Channel Attacks on Quantum Computers, with Travis Morrison, Jamie Sikora, and Nic Swanson. Proceedings of the IEEE International Conference on Quantum Computing and Engineering (QCE 24).

  3. CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist, with Shuichi Katsumata, Yi-Fu Lai, and Ling Qin. CRYPTO 2023.

  4. Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies, with Reza Azarderakhsh and Brian Koziel. SciSec 2023.

  5. (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH, with Aaron Hutchinson. IWSEC 2021.

  6. How not to Create an Isogeny-Based PAKE, with Reza Azarderakhsh, David Jao, Brian Koziel, Vladimir Soukharev and Oleg Taraskin. ACNS 2020.

  7. Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors, with Aaron Hutchinson, Brian Koziel, and Reza Azarderakhsh. ACNS 2020.


Invited Talks

  1. Preliminary Report: CSI-Dragon - Blind Signatures go HD!
    Workshop on Isogeny Graphs in Cryptography, Banff International Research Station

  2. Practical Fault Injection Attacks on CSIDH and Mitigation Techniques
    Mathematical Congress of the Americas, Special Session on Post-Quantum Cryptography

  3. Practical Fault Injection Attacks on CSIDH and Mitigation Techniques
    SIAM Algebraic Geomtery, Minisymposium on Applications of Isogenies in Cryptography

  4. Duality Lower Bounds on the Cost of CSIDH Group Action Evaluation
    Workshop on Coding Theory and Cryptography, Virginia Tech Steger Center

  5. Duality Lower Bounds on the Cost of CSIDH Group Action Evaluation
    Applied Algebra Days, University of South Florida

  6. Mathematics of Communication - Cryptography and Coding Theory
    Mathematics - Opportunites in Reseearch and Education (MORE), Virginia Tech

  7. Practical Fault Injection Attacks on CSIDH, and Mitigation Techniques
    Special Session on Post-Quantum Cryptography, AMS Southeastern Sectional Meeting

  8. Post-Quantum Blind Signatures from Code Equivalence
    Special Session on Cryptography and Related Fields, Joint Mathematics Meetings

  9. Post-Quantum Blind Signatures from Group Actions
    Mathematical Cryptography Workshop, University of Auckland

  10. Post-Quantum Adaptor Signatures from Non-Abelian Group Actions
    VT-Swiss Coding Theory and Cryptography Summer School, Virginia Tech Steger Center

  11. Post-Quantum Cryptography with Advanced Functionalities
    Workshop on Secure and Trustworthy Data and Technology, Virginia Tech

  12. Matrix Code Equivalence in Cryptography
    Algebraic Coding Theory in Virginia (Tech) (ACTiV(T)), Virginia Tech.

  13. Post-Quantum Blind Signatures from Group Actions.
    Crypto Café, Florida Atlantic University.

  14. Post-Quantum Cryptography with Advanced Functionalities.
    Data Security and Machine Learning Workshop, Clemson University.

  15. CSI-Otter: An Isogeny-Based Blind Signature Scheme.
    Joint Mathematics Meetings 2024 special session on Cryptography and Related Fields.

  16. Post-Quantum Cryptography with Advanced Functionalities.
    Virginia Tech Center for Quantum Information Science and Engineering Symposium.

  17. Isogeny-Based Post-Quatum Cryptography.
    Virginia Tech Mathematics Department Colloquium.

  18. Post-Quantum Exotic Signatures from Group Actions.
    Virginia Tech Steger Center, Coding Theory and Cryptography Workshop.

  19. Optimization of Algorithms for Isogeny-Based Key Establishment.
    University of South Florida Mathematics Department Colloquium.

  20. CSI-Otter: An Isogeny-Based Blind Signature Scheme.
    SIAM Southeastern Sectional Meeting 2023 special session Public-Key Cryptography.

  21. Techniques for Fault Attack-Resistance in Static/Ephemeral CSIDH.
    Virginia Tech Algebra Seminar.

  22. Optimization of Algorithms for Isogeny-Based Key Establishment.
    Virginia Tech Algebra Seminar.

  23. Techniques for Fault Attack-Resistance in Static/Ephemeral CSIDH.
    University of Auckland Algebra and Combinatorics Seminar.

  24. Isogeny-Based Exotic Signatures and their Applications to Post-Quantum Blockchain.
    GITAM Hyderabad Faculty Development Program on "The Impact of Quantum Computing on Cryptography and Blockchain Technology."

  25. Optimization of Algorithms for Isogeny-Based Key Establishment.
    University of Auckland Algebra and Combinatorics Seminar.