Follow
Tako Boris Fouotsa
Tako Boris Fouotsa
Postdoc, EPFL
Verified email at epfl.ch - Homepage
Title
Cited by
Cited by
Year
M-SIDH and MD-SIDH: countering SIDH attacks by masking information
TB Fouotsa, T Moriya, C Petit
Annual International Conference on the Theory and Applications of …, 2023
442023
Séta: Supersingular encryption from torsion attacks
L De Feo, C Delpech de Saint Guilhem, TB Fouotsa, P Kutas, A Leroux, ...
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
432021
SCALLOP: scaling the CSI-FiSh
LD Feo, TB Fouotsa, P Kutas, A Leroux, SP Merz, L Panny, B Wesolowski
IACR International Conference on Public-Key Cryptography, 345-375, 2023
412023
Supersingular curves you can trust
A Basso, G Codogni, D Connolly, L De Feo, TB Fouotsa, GM Lido, ...
Annual International Conference on the Theory and Applications of …, 2023
352023
On the isogeny problem with torsion point information
TB Fouotsa, P Kutas, SP Merz, YB Ti
IACR International Conference on Public-Key Cryptography, 142-161, 2022
26*2022
Failing to hash into supersingular isogeny graphs
J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, S Kunzweiler, ...
arXiv preprint arXiv:2205.00135, 2022
232022
SIDH with masked torsion point images
TB Fouotsa
Cryptology ePrint Archive, 2022
222022
A new adaptive attack on SIDH
TB Fouotsa, C Petit
Cryptographers’ Track at the RSA Conference, 322-344, 2022
192022
SimS: a simplification of SiGamal
TB Fouotsa, C Petit
International Conference on Post-Quantum Cryptography, 277-295, 2021
15*2021
New sidh countermeasures for a more efficient key exchange
A Basso, TB Fouotsa
International Conference on the Theory and Application of Cryptology and …, 2023
132023
SHealS and HealS: isogeny-based PKEs from a key validation method for SIDH
TB Fouotsa, C Petit
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
112021
Exploring SIDH-Based Signature Parameters
A Basso, M Chen, TB Fouotsa, P Kutas, A Laval, L Marco, GT Saah
International Conference on Applied Cryptography and Network Security, 432-456, 2024
32024
Failing to hash into supersingular isogeny graphs
C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024
Avoiding Trusted Setup in Isogeny-based Commitments
GT Saah, TB Fouotsa, E Fouotsa, C Nkuimi-Jugnia
Cryptology ePrint Archive, 2024
2024
Isogeny problems with level structure
L De Feo, TB Fouotsa, L Panny
Cryptology ePrint Archive, 2024
2024
SILBE: an Updatable Public Key Encryption Scheme from Lollipop Attacks
M Duparc, TB Fouotsa, S Vaudenay
Cryptology ePrint Archive, 2024
2024
On the design and cryptanalysis of Isogeny-Based Public Key Encryption schemes
TB Fouotsa
Università Degli Studi di Roma Tre, 2022
2022
Group ID U10433 Affiliated authors Aellig, Alexandre
D Aggarwal, G Avoine, T Baignères, MF Balli, S Banik, K Barooti, A Bay, ...
SHealS and HealS
TB Fouotsa, C Petit
The system can't perform the operation now. Try again later.
Articles 1–19