Applied and Provable Security

Search results

  • 2016

    From 5-pass MQ-based identification to MQ-based signatures

    Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Springer, p. 135-165 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 ).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    54 Citations (Scopus)
  • Mitigating multi-target attacks in hash-based signatures

    Hülsing, A. T., Rijneveld, J. & Song, F., 2016, Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Proceedings, part I. Cheng, C.-M., Chung, K.-M., Persiano, G. & Yang, B.-Y. (eds.). Springer, Vol. 9614. p. 387-416 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9614).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    74 Citations (Scopus)
  • Semantic security and indistinguishability in the quantum world

    Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2016, Advances in Cryptology – CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part III. Robshaw, M. & Katz, J. (eds.). Dordrecht: Springer, p. 60-89 30 p. (Lecture Notes in Computer Science; vol. 9816).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    37 Citations (Scopus)
    1 Downloads (Pure)
  • 2015

    ARMed SPHINCS : computing a 41KB signature in 16KB of RAM

    Hülsing, A. T., Rijneveld, J. & Schwabe, P., 2015, s.l.: IACR. 25 p. (Cryptology ePrint Archive; vol. 2015/1042)

    Research output: Book/ReportReportAcademic

  • Bad directions in cryptographic hash functions

    Bernstein, D. J., Hülsing, A., Lange, T. & Niederhagen, R., 2015, Information Security and Privacy : 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 -- July 1, 2015, Proceedings. Foo, E. & Stebila, D. (eds.). Berlin: Springer, p. 488-508 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9144).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • Bad directions in cryptographic hash functions

    Bernstein, D. J., Hülsing, A. T., Lange, T. & Niederhagen, R. F., 2015, IACR. 27 p. (Cryptology ePrint Archive; vol. 2015/151)

    Research output: Book/ReportReportAcademic

    Open Access
    File
    306 Downloads (Pure)
  • How to manipulate curve standards: a white paper for the black hat

    Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A., Lambooij, E., Lange, T., Niederhagen, R. & Van Vredendaal, C., 2015, Security Standardisation Research: Second International Conference, SSR 2015, Tokyo, Japan, December 15-16, 2015, Proceedings. Chen, L. & Matsuo, S. (eds.). Berlin: Springer, p. 109-139 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9497).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    12 Citations (Scopus)
    3 Downloads (Pure)
  • PALPAS ± PAsswordLess PAssword Synchronization

    Horsch, M., Hülsing, A. T. & Buchmann, J., 2015, s.n. 11 p. (arXiv; vol. 1506.04549 [cs.CR])

    Research output: Book/ReportReportAcademic

  • PALPAS - PAssword Less PAssword synchronization

    Horsch, M., Hülsing, A. T. & Buchmann, J., 16 Oct 2015, Proceedings - 10th International Conference on Availability, Reliability and Security, ARES 2015. Piscataway: Institute of Electrical and Electronics Engineers, p. 30-39 10 p. 7299896

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Semantic security and indistinguishability in the quantum world

    Gagliardoni, T., Hülsing, A. T. & Schaffner, C., 2015, s.n. 32 p. (arXiv; vol. 1504.05255 [cs.CR])

    Research output: Book/ReportReportAcademic

    Open Access
    File
    179 Downloads (Pure)
  • SPHINCS : practical stateless hash-based signatures

    Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2015, Advances in Cryptology - Eurocrypt 2015 (34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015. Proceedings, Part I). Oswald, E. & Fischlin, M. (eds.). Berlin: Springer, p. 368-397 (Lecture Notes in Computer Science; vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    221 Citations (Scopus)
  • 2014

    How to manipulate curve standards : a white paper for the black hat

    Bernstein, D. J., Chou, T., Chuengsatiansup, C., Hülsing, A. T., Lange, T., Niederhagen, R. F. & Vredendaal, van, C., 2014, IACR. 18 p. (Cryptology ePrint Archive; vol. 2014/571)

    Research output: Book/ReportReportAcademic

    Open Access
    3 Downloads (Pure)
  • SPHINCS: practical stateless hash-based signatures

    Bernstein, D. J., Hopwood, D., Hülsing, A. T., Lange, T., Niederhagen, R. F., Papachristodoulou, L., Schwabe, P. & Wilcox O'Hearn, Z., 2014, International Association for Cryptologic Research. 26 p. (Cryptology ePrint Archive; vol. 2014/795)

    Research output: Book/ReportReportAcademic

    Open Access
  • 2013

    Developing and testing a visual hash scheme

    Olembo, M. M., Kilian, T., Stockhardt, S., Hülsing, A. & Volkamer, M., 2013, Proceedings of the European Information Security Multi-Conference, EISMC 2013, 8-10 may 2013, Portugal, Lisbon. Plymouth University, Centre for Security, Communications & Network Research, p. 91-100 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Instantiating Treeless Signature Schemes

    Weiden, P., Hülsing, A., Cabarcas, D. & Buchmann, J., 2013, In: IACR Cryptology ePrint Archive. 2013, p. 65 1 p.

    Research output: Contribution to journalArticleAcademic

  • On the security of the Winternitz one-time signature scheme

    Buchmann, J., Dahmen, E., Ereth, S., Hülsing, A. & Rückert, M., 2013, In: International Journal of Applied Cryptography. 3, 1, p. 84-96 13 p.

    Research output: Contribution to journalArticleAcademicpeer-review

    13 Citations (Scopus)
  • Optimal parameters for XMSSMT

    Hülsing, A. T., Rausch, L. & Buchmann, J., 2013, Security engineering and intelligence informatics : CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings. Berlin: Springer, p. 194-208 15 p. (Lecture Notes in Computer Science; vol. 8128).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    55 Citations (Scopus)
  • 2007

    Security of invertible media authentication schemes revisited

    Dönigus, D., Endler, S., Fischlin, M., Hülsing, A. T., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M. & Weidemann, F., 2007, Information Hiding : 9th International Workshop, IH 2007, Saint Malo, France, June 11-13, 2007, Revised Selected Papers. Furon, T., Cayre, F., Doërr, G. & Bas, P. (eds.). Berlin: Springer, p. 189-203 15 p. (Lecture Notes in Computer Science (LNCS); vol. 4567).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review