#### Filter Results:

- Full text PDF available (21)

#### Publication Year

2008

2018

- This year (1)
- Last 5 years (14)
- Last 10 years (29)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Dustin Moody, Ray A. Perlner
- IACR Cryptology ePrint Archive
- 2015

In 2014, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on â€œgeneralized errorâ€¦ (More)

- Dustin Moody
- 2011

We look at arithmetic progressions on elliptic curves known as Huff curves. By an arithmetic progression on an elliptic curve, we mean that either the x or y-coordinates of a sequence of rationalâ€¦ (More)

- Dustin Moody, Rene Peralta, Ray A. Perlner, Andrew Regenscheid, Allen Roginsky, Lily J Y Chen
- Journal of research of the National Institute ofâ€¦
- 2015

This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST's position on standardizing and recommending pairing-based cryptography schemesâ€¦ (More)

- Dustin Moody, Daniel Shumow
- IACR Cryptology ePrint Archive
- 2011

Isogenies of elliptic curves have been well-studied, in part because there are several cryptographic applications. Using VÃ©luâ€™s formula, isogenies can be evaluated explicitly given their kernel.â€¦ (More)

- Dustin Moody, Ray A. Perlner, Daniel Smith-Tone
- SAC
- 2016

- Melissa Chase, Hao Chen, +9 authors Vinod Vaikuntanathan
- 2017

We met as a group during the Homomorphic Encryption Standardization Workshop on July 1314, 2017, hosted at Microsoft Research in Redmond. Researchers from around the world represented a number ofâ€¦ (More)

- Foad Khoshnam, Dustin Moody, ARMAN SHAMSI ZARGAR
- 2013

A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S.â€¦ (More)

- Dustin Moody, Ray A. Perlner, Daniel Smith-Tone
- IACR Cryptology ePrint Archive
- 2017

In the last few years multivariate public key cryptography has experienced an infusion of new ideas for encryption. Among these new strategies is the ABC Simple Matrix family of encryption schemesâ€¦ (More)

- Dustin Moody
- IACR Cryptology ePrint Archive
- 2010

R. Feng, and H. Wu recently established a certain mean-value formula for the x-coordinates of the n-division points on an elliptic curve given in Weierstrass form (A mean value formula for ellipticâ€¦ (More)

- Dustin Moody, Souradyuti Paul, Daniel Smith-Tone
- IACR Cryptology ePrint Archive
- 2011

A hash function secure in the indifferentiability framework (TCC 2004) is able to resist all meaningful generic attacks. Such hash functions also play a crucial role in establishing the security ofâ€¦ (More)