Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Renes, Joost
add a person with the name Renes, Joost
 

Other publications of authors with the same name

Implementing Complete Formulas on Weierstrass Curves in Hardware., , and . SPACE, volume 10076 of Lecture Notes in Computer Science, page 89-108. Springer, (2016)Complete Addition Formulas for Prime Order Elliptic Curves., , and . EUROCRYPT (1), volume 9665 of Lecture Notes in Computer Science, page 403-428. Springer, (2016)$μ$Kummer: efficient hyperelliptic signatures and key exchange on microcontrollers., , , and . CoRR, (2016)Computing isogenies between Montgomery curves using the action of (0, 0).. IACR Cryptology ePrint Archive, (2017)CSIDH: An Efficient Post-Quantum Commutative Group Action., , , , and . ASIACRYPT (3), volume 11274 of Lecture Notes in Computer Science, page 395-427. Springer, (2018)Complete addition formulas for prime order elliptic curves., , and . IACR Cryptology ePrint Archive, (2015)Improved Classical Cryptanalysis of the Computational Supersingular Isogeny Problem., , , , and . IACR Cryptology ePrint Archive, (2019)Efficient compression of SIDH public keys., , , , , and . IACR Cryptology ePrint Archive, (2016)Kummer: Efficient Hyperelliptic Signatures and Key Exchange on Microcontrollers., , , and . CHES, volume 9813 of Lecture Notes in Computer Science, page 301-320. Springer, (2016)On Kummer Lines with Full Rational 2-torsion and Their Usage in Cryptography., and . ACM Trans. Math. Softw., 45 (4): 39:1-39:17 (2019)