Follow
Lukas Zobernig
Lukas Zobernig
Research Fellow, University of Auckland
Verified email at auckland.ac.nz
Title
Cited by
Cited by
Year
SIDH proof of knowledge
L De Feo, S Dobson, SD Galbraith, L Zobernig
International Conference on the Theory and Application of Cryptology and …, 2022
332022
Obfuscated fuzzy hamming distance and conjunctions from subset product problems
SD Galbraith, L Zobernig
Theory of Cryptography Conference, 81-110, 2019
302019
Failing to hash into supersingular isogeny graphs
J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, S Kunzweiler, ...
arXiv preprint arXiv:2205.00135, 2022
232022
An adaptive attack on 2-SIDH
S Dobson, SD Galbraith, J LeGrow, YB Ti, L Zobernig
International Journal of Computer Mathematics: Computer Systems Theory 5 (4 …, 2020
232020
When are opaque predicates useful?
L Zobernig, SD Galbraith, G Russello
2019 18th IEEE International Conference On Trust, Security And Privacy In …, 2019
222019
Obfuscating finite automata
SD Galbraith, L Zobernig
Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021
102021
Towards a theory of special-purpose program obfuscation
MR Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
2020 IEEE 19th International Conference on Trust, Security and Privacy in …, 2020
32020
Mathematical aspects of program obfuscation
L Zobernig
PhD Thesis-University of Auckland, 2020
32020
A note on a static SIDH protocol
S Dobson, T Li, L Zobernig
Cryptology ePrint Archive, 2019
32019
Indistinguishable Predicates: A New Tool for Obfuscation.
L Zobernig, SD Galbraith, G Russello
IACR Cryptol. ePrint Arch. 2017, 787, 2017
32017
Genus 2 Curves in Small Characteristic
L Zobernig
arXiv preprint arXiv:2111.07270, 2021
12021
When Are Opaque Predicates Useful?
L Zobernig, SD Galbraith, G Russello
Cryptology ePrint Archive, 2017
12017
Failing to hash into supersingular isogeny graphs
C Petit, J Booher, R Bowden, J Doliskani, TB Fouotsa, SD Galbraith, ...
The Computer Journal, 2024
2024
Supersingular Non-Superspecial Abelian Surfaces in Cryptography
J LeGrow, YB Ti, L Zobernig
Mathematical Cryptology 3 (2), 11-23, 2023
2023
Abelian Varieties with -rank Zero
YB Ti, G Verret, L Zobernig
arXiv preprint arXiv:2203.08401, 2022
2022
Towards a Theory of Special-purpose Program Obfuscation
M Rizwan Asghar, S Galbraith, A Lanzi, G Russello, L Zobernig
arXiv e-prints, arXiv: 2011.02607, 2020
2020
Extending the Adaptive Attack to 2-SIDH.
S Dobson, SD Galbraith, JT LeGrow, YB Ti, L Zobernig
IACR Cryptol. ePrint Arch. 2019, 890, 2019
2019
The Modular Subset Product Problem and Obfuscation
L Zobernig
Modular Subset Products
L Zobernig
The system can't perform the operation now. Try again later.
Articles 1–19