Coding Theory and Cryptology

  • Postal addressShow on map

    Den Dolech 2, Metaforum, Department of Mathematics and Computer Science

    5612AZ Eindhoven

    Netherlands

Filter
Chapter

Search results

  • 2021

    An Account of the ISO/IEC Standardization of the Simon and Speck Block Cipher Families

    Ashur, T. & Luykx, A., 1 Jan 2021, Security of Ubiquitous Computing Systems: (Selected Topics). Springer, p. 63-78 16 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    Open Access
    File
    4 Citations (Scopus)
    38 Downloads (Pure)
  • 2020

    Algorithms for NP-Hard Problems via Rank-Related Parameters of Matrices

    Nederlof, J., 2020, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Springer, p. 145-164 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12160 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    6 Citations (Scopus)
  • 2019

    Matrix codes and rook theory

    Ravagnani, A., 2019, Oberwolfach Report of the conference "Contemporary Coding Theory".

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2018

    The Poincaré polynomial of a linear code

    Galindo, C., Hernando, F., Montserrat, F. & Pellikaan, G. R., 18 Sept 2018, Singularities, Algebraic Geometry, Commutative Algebra, and Related Topics: Festschrift for Antonio Campillo on the Occasion of his 65th Birthday. Greuel, G.-M., Narváez Macarro, L. & Xambó-Descamps, S. (eds.). Cham: Springer, p. 525-535 11 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    1 Downloads (Pure)
  • 2017

    Isogenies for point counting on genus two hyperelliptic curves with maximal real multiplication

    Ballentine, S., Guillevic, A., Lorenzo-Garcia, E., Martindale, C. R., Maisserer, M., Smith, B. & Top, J., 2017, Algebraic geometry for coding theory and cryptography. Howe, E. W., Lauter, K. E. & Walker, J. L. (eds.). Cham: Springer, p. 63-94 32 p. (Association for Women in Mathematics Series; vol. 9).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    5 Citations (Scopus)
  • Montgomery curves and the Montgomery ladder

    Bernstein, D. J. & Lange, T., 2017, Topics in Computational Number Theory Inspired by Peter L. Montgomery. Bos, J. W. ,. & Lenstra, A. K. (eds.). Cambridge: Cambridge University Press, p. 82-115

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    File
    749 Downloads (Pure)
  • 2016

    Dual EC: a standardized back door

    Bernstein, D. J., Lange, T. & Niederhagen, R., 2016, The New Codebreakers : Essays Dedicated to David Kahn on the Occasion of His 85th Birthday. Ryan, P. Y. A., Naccache, D. & Quisquater, J. J. (eds.). Dordrecht: Springer, p. 256-281 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9100).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

    Open Access
    50 Citations (Scopus)
  • 2015

    Basic constructions of secure multiparty computation

    Laud, P., Pankova, A., Kamm, L. & Veeningen, M. G., 2015, Applications of Secure Multiparty Computation. Laud, P. & Kamm, L. (eds.). Amsterdam: IOS Press, p. 1-25 (Cryptology and Information Security Series; vol. 13).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Citations (Scopus)
    11 Downloads (Pure)
  • 2014

    Preface

    Lange, T., Lauter, K. & Lisoněk, P., 1 Jan 2014, Selected areas in cryptography - SAC 2013: 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013 : revised selected papers. Berlin: Springer, p. V-VI 2 p. (Lecture Notes in Computer Science; vol. 8282).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 2013

    Addition formulas for elliptic curves

    Bernstein, D. J. & Lange, T., 2013, Handbook of Finite Fields. Mullen, G. L. & Panario, D. (eds.). London: Chapman & Hall/CRC Press, p. 440-446 (Discrete Mathematics and Its Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    4 Downloads (Pure)
  • Codes, arrangements and matroids

    Jurrius, R. P. M. J. & Pellikaan, G. R., 2013, Algebraic geometry modeling in information theory. Martínez-Moro, E. (ed.). London: World Scientific, p. 219-325 336 p. (Series on Coding Theory and Cryptology; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Het 3n+1-vermoeden

    Weger, de, B. M. M., 2013, Wiskunde in wording. Wiegerinck, J. J. O. O. (ed.). Amsterdam: Platform Wiskunde Nederland (PWN), p. 1-30 (Syllabus Vakantiecursus 2013).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    Open Access
    File
    118 Downloads (Pure)
  • 2011

    Chinese remainder theorem

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 201-202

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Decoding algorithms

    Peters, C. P., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 319-322

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Designated-verifier proofs

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 330-331

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Hash-based signatures

    Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 540-542

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Interactive argument

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 618-619

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Interactive proof

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 619-619

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Multiparty computation

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 812-815

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Noninteractive proof

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 846-846

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    2 Downloads (Pure)
  • Oblivious transfer

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 884-885

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Proof of knowledge vs. Proof of membership

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 983-984

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Protocol

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 990-990

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Shannon's model

    Tilborg, van, H. C. A., 2011, Encyclopedia of Cryptography and Security. Tilborg, van, H. C. A. & Jajodia, S. (eds.). 2nd ed. New York: Springer, p. 1194-1195

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Threshold homomorphic cryptosystems

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1293-1294

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Vector space

    Lange, T., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1356-1356

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Verifiable secret sharing

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1357-1358

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Witness hiding

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1391-1392

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Zero-knowledge

    Schoenmakers, B., 2011, Encyclopedia of Cryptography and Security (2nd ed.). Tilborg, van, H. C. A. & Jajodia, S. (eds.). New York: Springer, p. 1401-1403

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • 2010

    Decoding and finding the minimum distance with Gröbner bases : history and new insights

    Bulygin, S. & Pellikaan, G. R., 2010, Selected topics in information and coding theory. Woungang, I., Misra, S. & Misra, S. C. (eds.). London: World Scientific, p. 585-622 (Series on coding theory and cryptology; vol. 7).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
    1 Downloads (Pure)
  • Hoe je het cryptosysteem RSA soms kunt kraken

    Weger, de, B. M. M., 2010, Wiskunde: de uitdaging (Vakantiecursus 2010). Wiegerinck, J. J. O. O. (ed.). Amsterdam: Centrum voor Wiskunde en Informatica, p. 83-100 (CWI Syllabus; vol. 60).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Preface

    Bernstein, D. J. & Lange, T., 18 Jun 2010, Progress in cryptology - Africacrypt 2010: third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings. 1 p. (Lecture Notes in Computer Science; vol. 6055).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademicpeer-review

  • 2009

    Authentication codes from error-correcting codes; an overview

    Tilborg, van, H. C. A., 2009, Enhancing Cryptographic Primitives with Techniques from Error Correcting Codes. Preneel, B., Dodunekov, S., Rijmen, V. & Nikova, S. (eds.). Amsterdam: IOS Press, p. 3-16 (NATO Science for Peace and Security Series - D: Information and Communication Security; vol. 23).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • Decoding linear error-correcting codes up to half the minimum distance with Gröbner bases

    Bulygin, S. & Pellikaan, G. R., 2009, Gröbner Bases, Coding, and Cryptography. Sala, M., Mora, T., Perret, L., Sakata, S. & Traverso, C. (eds.). Berlin: Springer, p. 361-365 (Texts and Monographs in Symbolic Computation).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    3 Citations (Scopus)
    1 Downloads (Pure)
  • Voting schemes

    Schoenmakers, B., 2009, Algorithms and Theory of Computation Handbook, Second Edition, Volume 2: Special Topics and Techniques. Atallah, M. J. & Blanton, M. (eds.). Boca Raton FL: CRC Press, 21 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • 2007

    Client-server trade-offs in secure computation

    Schoenmakers, B. & Tuyls, P. T., 2007, Security, Privacy and Trust in Modern Data Management. Petkovic, M. & Jonker, W. (eds.). Berlin: Springer, p. 197-212 (Data-Centric Systems and Applications).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Computationally secure authentication with noisy data

    Schoenmakers, B. & Tuyls, P. T., 2007, Security with noisy data : on private biometrics, secure key storage and anti-counterfeiting. Tuyls, P. T., Skoric, B. & Kevenaar, T. (eds.). New York: Springer, p. 141-149

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    16 Citations (Scopus)
  • 2006

    Algebraic realizations of DL systems

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 547-572 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of elliptic curves

    Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 267-302 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of hyperelliptic curves

    Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 303-353 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Arithmetic of special curves

    Doche, C. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 355-387 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Background on curves and Jacobians

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 45-85 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Background on Weil descent

    Frey, G. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 125-132 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    4 Downloads (Pure)
  • Complex multiplication

    Frey, G. & Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 455-473 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    2 Downloads (Pure)
  • Elektronisch stemmen : cryptografie voor de democratie

    Schoenmakers, B. & Schippers, H., 2006, Gedreven door nieuwsgierigheid : een selectie uit 50 jaar TU/e-onderzoek. Lintsen, H. & Schippers, H. (eds.). Eindhoven: Stichting Historie der Techniek, p. 243-249

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Elliptische krommen in de cryptografie

    Tilborg, van, H. C. A., 2006, Actuele Wiskunde. Amsterdam: Centrum voor Wiskunde en Informatica, p. 7-20 208 p. (CWI Syllabus; vol. 56).

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

    1 Downloads (Pure)
  • Introduction to public-key cryptography

    Avanzi, R. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 1-15 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

    1 Downloads (Pure)
  • Key lengths

    Lenstra, A. K., 2006, Handbook of Information Security, Volume 1: Key Concepts, Infrastructure, Standards and Protocols. Bidgoli, H. (ed.). Wiley, 37 p.

    Research output: Chapter in Book/Report/Conference proceedingChapterProfessional

  • Mathematical countermeasures against side-channel attacks

    Lange, T., 2006, Handbook of elliptic and hyperelliptic curve cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 687-714 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic

  • Pairing-based cryptography

    Duquesne, S. & Lange, T., 2006, Handbook of Elliptic and Hyperelliptic Curve Cryptography. Cohen, H. & Frey, G. (eds.). Boca Raton FL, USA: Chapman & Hall/CRC Press, p. 573-590 (Discrete Mathematics and Its Applications; vol. 34).

    Research output: Chapter in Book/Report/Conference proceedingChapterAcademic