#### Filter Results:

- Full text PDF available (30)

#### Publication Year

2002

2017

- This year (3)
- Last 5 years (16)
- Last 10 years (30)

#### Publication Type

#### Co-author

#### Journals and Conferences

#### Key Phrases

Learn More

- David Jao, Luca De Feo
- IACR Cryptology ePrint Archive
- 2011

We present new candidates for quantum-resistant public-key cryptosystems based on the conjectured difficulty of finding isogenies between supersingular elliptic curves. The main technical idea in our scheme is that we transmit the images of torsion bases under the isogeny in order to allow the two parties to arrive at a common shared key despite the… (More)

- David Jao, Kuang Yu Chen
- Journal of cellular biochemistry
- 2006

Eukaryotic initiation factor 5A (eIF5A) is the only protein in nature that contains hypusine, an unusual amino acid formed post-translationally in two steps by deoxyhypusine synthase and deoxyhypusine hydroxylase. Genes encoding eIF5A or deoxyhypusine synthase are essential for cell survival and proliferation. To determine the physiological function of… (More)

- David Jao, Stephen D. Miller, Ramarathnam Venkatesan
- ASIACRYPT
- 2005

The aim of this paper is to justify the common cryptographic practice of selecting elliptic curves using their order as the primary criterion. We can formalize this issue by asking whether the discrete log problem (dlog) has the same difficulty for all curves over a given finite field with the same order. We prove that this is essentially true by showing… (More)

- Gurleen Grewal, Reza Azarderakhsh, Patrick Longa, Shi Hu, David Jao
- IACR Cryptology ePrint Archive
- 2012

As hardware capabilities increase, low-power devices such as smartphones represent a natural environment for the efficient implementation of cryptographic pairings. Few works in the literature have considered such platforms despite their growing importance in a postPC world. In this paper, we investigate the efficient computation of the Optimal-Ate pairing… (More)

- David Jao, Kayo Yoshida
- Pairing
- 2009

The Boneh-Boyen signature scheme is a pairing based short signature scheme which is provably secure in the standard model under the q-Strong Diffie-Hellman assumption. In this paper, we prove the converse of this statement, and show that forging Boneh-Boyen signatures is actually equivalent to solving the q-Strong Diffie-Hellman problem. Using this… (More)

- David Jao, Dimitar Jetchev, Ramarathnam Venkatesan
- INDOCRYPT
- 2007

We study the security of elliptic curve Diffie-Hellman secret keys in the presence of oracles that provide partial information on the value of the key. Unlike the corresponding problem for finite fields, little is known about this problem, and in the case of elliptic curves the difficulty of representing large point multiplications in an algebraic manner… (More)

- Andrew M. Childs, David Jao, Vladimir Soukharev
- J. Mathematical Cryptology
- 2014

Given two elliptic curves over a finite field having the same cardinality and endomorphism ring, it is known that the curves admit an isogeny between them, but finding such an isogeny is believed to be computationally difficult. The fastest known classical algorithm takes exponential time, and prior to our work no faster quantum algorithm was known.… (More)

We present a construction of expander graphs obtained from Cayley graphs of narrow ray class groups, whose eigenvalue bounds follow from the Generalized Riemann Hypothesis. Our result implies that the Cayley graph of (Z/qZ)∗ with respect to small prime generators is an expander. As another application, we show that the graph of small prime degree isogenies… (More)

- Colleen Swanson, David Jao
- INDOCRYPT
- 2009

We survey the set of all prior two-party certificateless key agreement protocols available in the literature at the time of this work. We find that all of the protocols exhibit vulnerabilities of varying severity, ranging from lack of resistance to leakage of ephemeral keys up to (in one case) a man-in-the-middle attack. Many of the protocols admit… (More)

- Qiang Huang, David Jao, Helen J. Wang
- ACM Conference on Computer and Communications…
- 2005

Recent work [27, 15] introduced a novel peer-to-peer application that leverages content sharing and aggregation among the peers to diagnose misconfigurations on a desktop PC. This application poses interesting challenges in preserving privacy of user configuration data and in maintaining integrity of troubleshooting results. In this paper, we provide a much… (More)