Research

My current research is in post-quantum cryptography. In particular I am interested in new post-quantum primitives; realizing classical cryptosystems over post-quantum primitives; protocols; efficient implementations; and quantum cryptanalysis. I have worked primarily on isogeny-based schemes built on the ideas underlying SIKE and CSIDH, and I am now also working on protocols built from other group actions, like LESS and MEDS. In the past, I have worked on combinatorial design theory, particularly on configuration orderings of balanced incomplete block designs.

Journal Articles

  1. Influences of Some Families of Error-Correcting Codes, with Hailey Egan, Gretchen L. Matthews, and Jeff Suliga. To appear in Involve, a Journal of Mathematics.

  2. Supersingular Non-Superspecial Abelian Surfaces in Cryptography, with Yan Bo Ti and Lukas Zobernig. Mathematical Cryptology vol. 3, no. 2 (2023), pp. 11-23.

  3. A Faster Method for Fault Attack Resistance in Static/Ephemeral CSIDH. Journal of Cryptographic Engineering vol. 13, no. 3 (2023), pp. 283-294.

  4. A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges and Research Directions with Maxime Buser, Rafael Dowsley, Muhammed Esgin, Clémentine Gritti, Shabnam Kasra Kermanshahi, Veronika Kuchta, Joseph Liu, Raphaël Phan, Amin Sakzad, Ron Steinfeld, and Jiangshan Yu. ACM Computing Surveys, vol. 55, no. 12 (2023), pp. 1-32.

  5. Cryptanalysis of "MAKE", with Daniel R. L. Brown and Neal Koblitz. Journal of Mathematical Cryptology, vol. 16, no. 1 (2022), pp. 98-102.

  6. An Adaptive Attack on 2-SIDH, with Samuel Dobson, Steven D. Galbraith, Yan Bo Ti, and Lukas Zobernig. International Journal of Computer Mathematics: Computer Systems Theory, vol. 5, no. 4 (2021), pp. 282-299

  7. Towards Isogeny-Based Password Authenticated Key Establishment, with Vladimir Soukharev, Oleg Taraskin, and David Jao. Journal of Mathematical Cryptology vol. 15 no. 1 (2021), pp. 18-30.

  8. A Subexponential-Time, Polynomial Quantum Space Algorithm for Inverting the CM Action, with David Jao, Christopher Leonardi, and Luis Ruiz-Lopez. Journal of Mathematical Cryptology vol. 14 no. 1 (2020), pp. 129-138.

  9. Hamiltonicity and Cycle Extensions in 0-Block-Intersection Graphs of Balanced Incomplete Block Designs, with David A. Pike and Jonathan Poulin. Designs, Codes, and Cryptography vol. 80, no. 3 (2016), pp. 421–433.

Refereed Conference Proceedings

  1. CSI-Otter: Isogeny-Based (Partially) Blind Signatures from the Class Group Action with a Twist, with Shuichi Katsumata, Yi-Fu Lai, and Ling Qin. CRYPTO 2023.

  2. Multiprime Strategies for Serial Evaluation of eSIDH-Like Isogenies, with Reza Azarderakhsh and Brian Koziel. SciSec 2023.

  3. (Short Paper) Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH, with Aaron Hutchinson. IWSEC 2021.

  4. How not to Create an Isogeny-Based PAKE, with Reza Azarderakhsh, David Jao, Brian Koziel, Vladimir Soukharev and Oleg Taraskin. ACNS 2020.

  5. Further Optimizations of CSIDH: A Systematic Approach to Efficient Strategies, Permutations, and Bound Vectors, with Aaron Hutchinson, Brian Koziel, and Reza Azarderakhsh. ACNS 2020.


Invited Talks

  1. Post-Quantum Blind Signatures from Group Actions.
    Crypto Café, Florida Atlantic University.

  2. Post-Quantum Cryptography with Advanced Functionalities.
    Data Security and Machine Learning Workshop, Clemson University.

  3. CSI-Otter: An Isogeny-Based Blind Signature Scheme.
    Joint Mathematics Meetings 2024 special session on Cryptography and Related Fields.

  4. Post-Quantum Cryptography with Advanced Functionalities.
    Virginia Tech Center for Quantum Information Science and Engineering Symposium.

  5. Isogeny-Based Post-Quatum Cryptography.
    Virginia Tech Mathematics Department Colloquium.

  6. Post-Quantum Exotic Signatures from Group Actions.
    Virginia Tech Steger Center, Coding Theory and Cryptography Workshop.

  7. Optimization of Algorithms for Isogeny-Based Key Establishment.
    University of South Florida Mathematics Department Colloquium.

  8. CSI-Otter: An Isogeny-Based Blind Signature Scheme.
    SIAM Southeastern Sectional Meeting 2023 special session Public-Key Cryptography.

  9. Techniques for Fault Attack-Resistance in Static/Ephemeral CSIDH.
    Virginia Tech Algebra Seminar.

  10. Optimization of Algorithms for Isogeny-Based Key Establishment.
    Virginia Tech Algebra Seminar.

  11. Techniques for Fault Attack-Resistance in Static/Ephemeral CSIDH.
    University of Auckland Algebra and Combinatorics Seminar.

  12. Isogeny-Based Exotic Signatures and their Applications to Post-Quantum Blockchain.
    GITAM Hyderabad Faculty Development Program on "The Impact of Quantum Computing on Cryptography and Blockchain Technology."

  13. Optimization of Algorithms for Isogeny-Based Key Establishment.
    University of Auckland Algebra and Combinatorics Seminar.