NIST logo

Publications Portal

You searched on: Author: Dustin Moody

Displaying records 1 to 10 of 19 records.
Resort by: Date / Title


1. Report on Post-Quantum Cryptography
Series: NIST Interagency/Internal Report (NISTIR)
Report Number: 8105
Published: 4/28/2016
Authors: Lidong Chen, Stephen P Jordan, Yi-Kai Liu, Dustin Moody, Rene C Peralta, Ray A Perlner, Daniel C Smith-Tone
Abstract: In recent years, there has been a substantial amount of research on quantum computers - machines that exploit quantum mechanical phenomena to solve mathematical problems that are difficult or intractable for conventional computers. If large-scale qua ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=920573

2. Vulnerabilities of "McEliece in the World of Escher"
Published: 3/3/2016
Authors: Dustin Moody, Ray A Perlner
Abstract: Recently, Gligoroski et al. proposed code-based encryption and signature schemes using list decoding, blockwise triangular private keys, and a nonuniform error pattern based on "generalized error sets." The general approach was referred to as "McE ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=919980

3. Analogues of Vélu's formulas for Isogenies on Alternate Models of Elliptic Curves
Published: 9/9/2015
Authors: Dustin Moody, Daniel Shumow
Abstract: Isogenies are the morphisms between elliptic curves, and are accordingly a topic of interest in the subject. As such, they have been well-studied, and have been used in several cryptographic applications. Vélu's formulas show how to explicitly ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917341

4. Improved Indifferentiability Security Bound for the JH Mode
Published: 2/15/2015
Authors: Dustin Moody, Daniel C Smith-Tone, Souradyuti Paul
Abstract: Indifferentiability security of a hash mode of operation guarantees the mode's resistance against all generic attacks. It is also useful to establish the security of protocols that use hash functions as random functions. The JH hash function was one ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=911448

5. Report on Pairing-based Cryptography
Series: Journal of Research (NIST JRES)
Report Number: 120.002
Published: 2/3/2015
Authors: Dustin Moody, Rene C Peralta, Ray A Perlner, Andrew Richard Regenscheid, Allen L Roginsky, Lidong Chen
Abstract: This report summarizes study results on pairing-based cryptography. The main purpose of the study is to form NIST‰s position on standardizing and recommending pairing-based cryptography schemes currently published in research literature and standard ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913932

6. An Asymptotically Optimal Structural Attack on the ABC Multivariate Encryption Scheme
Published: 10/3/2014
Authors: Dustin Moody, Ray A Perlner, Daniel C Smith-Tone
Abstract: Historically, multivariate public key cryptography has been less than successful at offering encryption schemes which are both secure and efficient. At PQCRYPTO '13 in Limoges, Tao, Diene, Tang, and Ding introduced a promising new multivariate e ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917340

7. Recommendation for Pair-Wise Key-Establishment Schemes Using Integer Factorization Cryptography
Series: Special Publication (NIST SP)
Report Number: 800-56B Rev 1
Published: 10/1/2014
Authors: Elaine B Barker, Lidong Chen, Dustin Moody
Abstract: This Recommendation specifies key-establishment schemes using integer factorization cryptography, based on ANS X9.44, Key-establishment using Integer Factorization Cryptography [ANS X9.44], which was developed by the Accredited Standards Committee (A ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=916341

8. Elliptic Curves arising from Brahmagupta Quadrilaterals
Published: 8/1/2014
Authors: Farzali Izadi, Foad Khoshnam, Dustin Moody, Arman Zargar
Abstract: A Brahmagupta quadrilateral is a cyclic quadrilateral whose sides, diagonals, and area are all integer values. In this article, we characterize the notions of Brahmagupta, introduced by K. R. S. Sastry, by means of elliptic curves. Motivated by ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=917344

9. On integer solutions of x^4+y^4-2z^4-2w^4=0
Published: 9/18/2013
Authors: Dustin Moody, Arman Shamsi Zargar
Abstract: In this article, we study the quartic Diophantine equation x^4+y^4-2z^4-2w^4=0. We find non-trivial integer solutions. Furthermore, we show that when a solution has been found, a series of other solutions can be derived. We do so using two dif ...
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=913962

10. Character sums determined by low degree isogenies of elliptic curves
Published: 7/25/2013
Authors: Dustin Moody, Christopher Rasmussen
Abstract: We look at certain character sums determined by isogenies on elliptic curves over finite fields. We prove a congruence condition for character sums attached to arbitrary cyclic isogenies, and produce explicit formulas for isogenies of degree m <= 8.
http://www.nist.gov/manuscript-publication-search.cfm?pub_id=909562



Search NIST-wide:


(Search abstract and keywords)


Last Name:
First Name:







Special Publications:

Looking for a NIST Special Publication (NIST SP Series)? Place the series number and dash in the report number field (Example: 800-) and begin your search.

  • SP 250-XX: Calibration Services
  • SP 260-XX: Standard Reference Materials
  • SP 300-XX: Precision Measurement and Calibration
  • SP 400-XX: Semiconductor Measurement Technology
  • SP 480-XX: Law Enforcement Technology
  • SP 500-XX: Computer Systems Technology
  • SP 700-XX: Industrial Measurement Series
  • SP 800-XX: Computer Security Series
  • SP 823-XX: Integrated Services Digital Network Series