Posts by Collection

pc

TCHES 2022

TCHES 2022

PC Member: 2022 https://ches.iacr.org/2022/callforpapers.php

TCHES 2023

TCHES 2023

PC Member: 2023 https://ches.iacr.org/2023/callforpapers.php

TCHES 2024

TCHES 2024

PC Member: 2024 https://ches.iacr.org/2024/callforpapers.php

PQCrypto 2025

PQCrypto 2025

PC Member: 2025 https://pqcrypto2025.iis.sinica.edu.tw/callforpapers.php#submission

ACNS 2024

ACNS 2024

PC Member: 2024 https://wp.nyu.edu/acns2024/program-committee/

Asiacrypt 2023

Published:

Asiacrypt 2023

PC Member: 2023 https://a

Eurocrypt 2022

Eurocrypt 2022

PC Member: 2022 https://eurocrypt.iacr.org/2022/callforpapers.php

LatinCrypt 2023

LatinCrypt 2023

PC Member: 2023 https://www.espe.edu.ec/latincrypt/

LatinCrypt 2025

LatinCrypt 2025

PC Member: 2025 https://ciencias.medellin.unal.edu.co/eventos/latincrypt/

publications

Concrete Quantum Cryptanalysis of Binary Elliptic Curves

Published in In *IACR Transactions on Cryptographic Hardware and Embedded Systems* (TCHES), 2020

This paper optimizes quantum circuits for solving discrete logarithms over binary elliptic curves, reducing qubit and gate requirements to enable more feasible attacks with Shor’s algorithm.

Download Paper

CTIDH: Faster Constant-Time CSIDH

Published in In *IACR Transactions on Cryptographic Hardware and Embedded Systems* (TCHES), 2021

This work presents CTIDH, a new key space and algorithm that jointly enable fast, constant-time CSIDH, significantly reducing multiplication and cycle counts.

Download Paper

Disorientation Faults in CSIDH

Published in In *IACR eprint*, 2022

This paper introduces disorientation fault attacks against CSIDH and CTIDH implementations, exploiting algebraic subroutines to recover secret keys with a modest number of faults.

Download Paper

Multi-Armed SPHINCS+

Published in In *ACNS-SCI 2023*, 2023

This paper accelerates SPHINCS+ signing on mobile CPUs using parallelism and vector extensions, achieving 15x speed-up over sequential implementations.

Download Paper

A Fault Analysis on SNOVA

Published in In *eprint*, 2024

This paper performs a fault analysis on the SNOVA signature scheme, revealing key-recovery vulnerabilities under both transient and permanent fault conditions.

Download Paper

talks

Introduction to Quantum Algorithms

Published:

This lecture served as an introduction to fundamental quantum algorithms, with a focus on their cryptanalytic implications. Presented at the ECRYPT-NET Crypto Cloud School in Leuven.

Download Paper

DAGS – Key Encapsulation from Dyadic GS Codes

Published:

This talk presents DAGS, a key encapsulation mechanism based on dyadic Goppa codes. It was delivered during the Combined Event on Post-Quantum Cryptography in Tenerife, with a focus on code-based cryptography and standardization efforts.

Download Paper

Quantum Circuits: Simulating a Quantum Computer

Published:

This talk introduces quantum circuits and demonstrates how to simulate a quantum computer using classical tools. It was presented at the Quantum Research Retreat in Tenerife, accompanied by an open-source demo on GitHub.

Download Paper

Quantum Cryptanalysis of ECC

Published:

This seminar presents recent advances in quantum cryptanalysis of elliptic curve cryptography (ECC), including resource estimation, algorithmic improvements, and implications for the security of real-world protocols.

Download Paper