Coding Theory and Cryptology

  • Postal addressShow on map

    Den Dolech 2, Metaforum, Department of Mathematics and Computer Science

    5612AZ Eindhoven

    Netherlands

Filter
Conference contribution

Search results

  • 2023

    Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem

    Ran, L., Samardjiska, S. & Trimoska, M., 2023, Code-Based Cryptography - 11th International Workshop, CBCrypto 2023, Revised Selected Papers. Esser, A. & Santini, P. (eds.). p. 84-103 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14311 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Concrete Analysis of Quantum Lattice Enumeration

    Bai, S., van Hoof, M. I., Johnson, F. B., Lange, T. & Ngo, T., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 131-166 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14440 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Disorientation Faults in CSIDH

    Banegas, G., Krämer, J., Lange, T., Meyer, M., Panny, L., Reijnders, K., Sotáková, J. & Trimoska, M., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 310-342 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • Efficient Extended GCD and Class Groups from Secure Integer Arithmetic

    Schoenmakers, B. & Segers, T., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer, p. 32-48 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

    Hövelmanns, K., Hülsing, A. & Majenz, C., 2023, Advances in Cryptology -- ASIACRYPT 2022. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 414-443 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic

    Korzilius, S. & Schoenmakers, B., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer, p. 307-319 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Practical key-recovery attack on MQ-Sign and more

    Aulbach, T., Samardjiska, S. & Trimoska, M., 2023, (Accepted/In press) PQCrypto 2024.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Recovering the Tight Security Proof of SPHINCS+

    Hülsing, A. & Kudinov, M., Jan 2023, Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part IV. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 3-33 31 p. (Lecture Notes in Computer Science (LNCS); vol. 13794).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    5 Citations (Scopus)
  • Towards Transparent Cheat Detection in Online Chess: An Application of Human and Computer Decision-Making Preferences

    Laarhoven, T. & Ponukumati, A., 2023, Computers and Games - International Conference, CG 2022, Revised Selected Papers. Browne, C., Kishimoto, A. & Schaeffer, J. (eds.). Springer, p. 163-180 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13865 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2022

    Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.

    Hülsing, A., Meijers, M. & Strub, P.-Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 622-653 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Post Quantum Noise.

    Angel, Y., Dowling, B., Hülsing, A., Schwabe, P. & Weber, F., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 97-109 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    4 Citations (Scopus)
  • 2021

    Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.

    Han, S., Jager, T., Kiltz, E., Liu, S., Pan, J., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). p. 670-700 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    12 Citations (Scopus)
  • Dual Lattice Attacks for Closest Vector Problems (with Preprocessing).

    Laarhoven, T. & Walter, M., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). p. 478-502 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12704 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Efficient Secure Ridge Regression from Randomized Gaussian Elimination

    Blom, F., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer, p. 301-316 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Epochal Signatures for Deniable Group Chats

    Hülsing, A. & Weber, F., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 1677-1695 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing

    Duman, J., Hövelmanns, K., Kiltz, E., Lyubashevsky, V. & Seiler, G., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 2722-2737 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    10 Citations (Scopus)
  • Lower Bounds on Lattice Sieving and Information Set Decoding.

    Kirshanova, E. & Laarhoven, T., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 791-820 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • On the Impossibility of Purely Algebraic Signatures.

    Döttling, N., Hartmann, D., Hofheinz, D., Kiltz, E., Schäge, S. & Ursu, B., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). p. 317-349 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    5 Citations (Scopus)
  • Post-Quantum WireGuard

    Hülsing, A., Ning, K., Schwabe, P., Weber, F. & Zimmermann, P. R., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 304-321 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    25 Citations (Scopus)
  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, Vol. 1. p. 637-667 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Tightly-Secure Authenticated Key Exchange, Revisited.

    Jager, T., Kiltz, E., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). p. 117-146 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    7 Citations (Scopus)
  • Verifying Post-Quantum Signatures in 8 kB of RAM.

    Gonzalez, R., Hülsing, A., Kannwischer, M. J., Krämer, J., Lange, T., Stöttinger, M., Waitz, E., Wiggers, T. & Yang, B.-Y., 2021, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Proceedings. Cheon, J. H. & Tillich, J.-P. (eds.). p. 215-233 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    6 Citations (Scopus)
  • 2020

    A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals

    Bouman, N. J. & de Vreede, N., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer, p. 398-417 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Detecting feedback vertex sets of size K in O*(2.7k) time

    Li, J. & Nederlof, J., 2020, 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. Chawla, S. (ed.). Association for Computing Machinery, Inc, p. 971-989 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Generalized Matsui Algorithm 1 with Application for the Full DES

    Ashur, T., Posteuca, R., Šijačić, D. & D’haeseleer, S., 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 448-467 20 p. (Lecture notes in computer science; vol. 12238)(Security and Cryptology; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    46 Downloads (Pure)
  • Generic Authenticated Key Exchange in the Quantum Random Oracle Model.

    Hövelmanns, K., Kiltz, E., Schäge, S. & Unruh, D., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). p. 389-422 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    23 Citations (Scopus)
  • Hamiltonian Cycle Parameterized by Treedepth in Single Exponential Time and Polynomial Space

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 2020, Graph-Theoretic Concepts in Computer Science: 46th International Workshop, WG 2020, Leeds, UK, June 24–26, 2020, Revised Selected Papers. Adler, I. & Müller, H. (eds.). Springer, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)
  • McTiny: Fast high-confidence post-quantum key erasure for tiny network servers

    Bernstein, D. J. & Lange, T., 2020, Proceedings of the 29th USENIX Security Symposium. Usenix Association, p. 1731-1748 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • On the Fine-Grained Parameterized Complexity of Partial Scheduling to Minimize the Makespan.

    Nederlof, J. & Swennenhuis, C. M. F., Dec 2020, 15th International Symposium on Parameterized and Exact Computation (IPEC 2020). Cao, Y. & Pilipczuk, M. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 25:1-25:17 25. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 180).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Laarhoven, T., 1 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 76:1-76:14 14 p. 76. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Prelude to Marvellous: With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy

    Ashur, T. & Dhooghe, S., Aug 2020, The Conference for Failed Approaches and Insightful Losses in Cryptology: CFail 2020. 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    42 Downloads (Pure)
  • Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.

    Schäge, S., Schwenk, J. & Lauer, S., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). p. 567-596 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    3 Citations (Scopus)
  • Rational Isogenies from Irrational Endomorphisms

    Castryck, W., Panny, L. & Vercauteren, F., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 523-548 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)
  • Rotational Cryptanalysis on MAC Algorithm Chaskey

    Kraleva, L., Ashur, T. & Rijmen, V., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings: ACNS 2020. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer, p. 153-168 16 p. (Lecture Notes in Computer Science ; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Citations (Scopus)
    35 Downloads (Pure)
  • Sieve, Enumerate, Slice, and Lift: - Hybrid Lattice Algorithms for SVP via CVPP.

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2020, Progress in Cryptology - AFRICACRYPT 2020 - 12th International Conference on Cryptology in Africa, Proceedings. Nitaj, A. & Youssef, A. (eds.). Springer, p. 301-320 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12174 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • The Randomized Slicer for CVPP: Sharper, Faster, Smaller, Batchier

    Ducas, L., Laarhoven, T. & van Woerden, W. P. J., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). Springer, p. 3-36 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
  • 2019

    Application of complementary dual AG codes to entanglement-assisted quantum codes

    Pereira, F. R. F., Pellikaan, R., La Guardia, G. G. & De Assis, F. M., 1 Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 2559-2563 5 p. 8849685

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
  • A reaction attack against cryptosystems based on LRPC codes

    Samardjiska, S., Santini, P., Persichetti, E. & Banegas, G., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 197-216 20 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    16 Citations (Scopus)
  • DAGS: reloaded revisiting dyadic key encapsulation

    Banegas, G., Barreto, P. S. L. M., Boidje, B. O., Cayrel, P.-L., Dione, G. N., Gaj, K., Gueye, C. T., Haeussler, R., Klamti, J. B., Ndiaye, O., Nguyen, D. T., Persichetti, E. & Ricardini, J. E., 2019, Code-Based Cryptography - 7th International Workshop, CBC 2019, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (eds.). Cham: Springer, p. 69-85 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11666 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    4 Citations (Scopus)
  • Decisional second-preimage resistance: when does SPR imply PRE?

    Bernstein, D. J. & Hülsing, A., 22 Nov 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Berlin: Springer, p. 33-62 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11923 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • Don't forget your roots: Constant-time root finding over F 2 m

    Martins, D., Banegas, G. & Custódio, R., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 109-129 21 p. (Lecture Notes in Computer Science; vol. 11774).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Entanglement-assisted quantum codes from algebraic geometry codes

    Fernandes Pereira, F., Pellikaan, R., Gadioli La Guardia, G. & de Assis, F. M., 2019, Proceedings of the WCC 2019: The Eleventh International Workshop on Coding and Cryptography. 10 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Evolutionary techniques in lattice sieving algorithms

    Laarhoven, T., 2019, IJCCI 2019 - Proceedings of the 11th International Joint Conference on Computational Intelligence. Merelo, J. J., Garibaldi, J., Linares-Barranco, A., Madani, K., Warwick, K. & Warwick, K. (eds.). Setúbal: SciTePress Digital Library, p. 31-39 9 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Citations (Scopus)
    115 Downloads (Pure)
  • Faster SeaSign signatures through improved rejection sampling

    Decru, T., Panny, L. & Vercauteren, F., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)
  • Fast secure comparison for medium-sized integers and its application in binarized neural networks

    Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    7 Citations (Scopus)
  • Finding closest lattice vectors using approximate voronoi cells

    Doulgerakis, E., Laarhoven, T. & de Weger, B., 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    12 Citations (Scopus)
    1 Downloads (Pure)
  • Nearest neighbor decoding for Tardos fingerprinting codes

    Laarhoven, T. M. M., 2 Jul 2019, IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: Association for Computing Machinery, Inc, p. 182-187 6 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • On the sparsity of MRD codes

    Ravagnani, A. & Byrne, E., 2019, 11th International Workshop on Coding and Cryptography - WCC 2019.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Quantum BCH and reed-solomon entanglement-assisted codes

    Fernandes Pereira, F. & Pellikaan, R., 2019, Proceedings of the 40th WIC Symposium on Information Theory in the Benelux . p. 102 1 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

    Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    34 Citations (Scopus)
    238 Downloads (Pure)