• Postbus 513, MF

    5600MB Eindhoven

    Netherlands

Research Output

Filter
Conference contribution
2020

Rotational-XOR Cryptanalysis of Simon-like Block Ciphers

Lu, J., Liu, Y., Ashur, T., Sun, B. & Li, C., 22 Apr 2020, (Accepted/In press) In Information Security and Privacy - 2020th Australasian Conference, ACISP 2020. Cui, H. & Liu, J. (eds.). Springer, 21 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

The angular blowing-a-kiss problem

Struijs, M. A. C., Buchin, K. A., Kostitsyna, I. & Lambers, R., 16 Mar 2020, EuroCG 2020: Book of Abstracts, 36th European Workshop on Computational Geometry. p. 74:1-74:7 7 p. 74

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademic

The Strictly Zero-Correlation Attack with Application to the Full DES

Ashur, T., Posteuca, R., Šijačić, D. & D’haeseleer, S., 15 Jun 2020, (Accepted/In press) Security and Communication Networks(2020). Springer, 16 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

File
2019

Application of complementary dual AG codes to entanglement-assisted quantum codes

Pereira, F. R. F., Pellikaan, R., La Guardia, G. G. & De Assis, F. M., 1 Jul 2019, 2019 IEEE International Symposium on Information Theory, ISIT 2019 - Proceedings. Piscataway: Institute of Electrical and Electronics Engineers, p. 2559-2563 5 p. 8849685

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

A reaction attack against cryptosystems based on LRPC codes

Samardjiska, S., Santini, P., Persichetti, E. & Banegas, G., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 197-216 20 p. (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

DAGS: reloaded revisiting dyadic key encapsulation

Banegas, G., Barreto, P. S. L. M., Boidje, B. O., Cayrel, P-L., Dione, G. N., Gaj, K., Gueye, C. T., Haeussler, R., Klamti, J. B., Ndiaye, O., Nguyen, D. T., Persichetti, E. & Ricardini, J. E., 2019, Code-Based Cryptography - 7th International Workshop, CBC 2019, Revised Selected Papers. Baldi, M., Santini, P. & Persichetti, E. (eds.). Cham: Springer, p. 69-85 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11666 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Decisional second-preimage resistance: when does SPR imply PRE?

Bernstein, D. J. & Hülsing, A., 22 Nov 2019, Advances in Cryptology – ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Galbraith, S. D. & Moriai, S. (eds.). Berlin: Springer, p. 33-62 30 p. (Lecture notes in computer science; vol. 11923).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Don't forget your roots: Constant-time root finding over F 2 m

Martins, D., Banegas, G. & Custódio, R., 2019, Progress in Cryptology – LATINCRYPT 2019 - 6th International Conference on Cryptology and Information Security in Latin America, Proceedings. Schwabe, P. & Thériault, N. (eds.). Cham: Springer, p. 109-129 21 p. (Lecture Notes in Computer Science; vol. 11774).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Entanglement-assisted quantum codes from algebraic geometry codes

Fernandes Pereira, F., Pellikaan, R., Gadioli La Guardia, G. & de Assis, F. M., 2019, Proceedings of the WCC 2019: The Eleventh International Workshop on Coding and Cryptography. 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Equal-subset-sum faster than the meet-in-the-middle

Mucha, M., Nederlof, J., Pawlewicz, J. & Węgrzycki, K., Sep 2019, 27th Annual European Symposium on Algorithms, ESA 2019. Bender, M. A., Svensson, O. & Herman, G. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 16 p. 73. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
5 Downloads (Pure)

Evolutionary techniques in lattice sieving algorithms

Laarhoven, T., 1 Jan 2019, IJCCI 2019 - Proceedings of the 11th International Joint Conference on Computational Intelligence. Merelo, J. J., Garibaldi, J., Linares-Barranco, A., Madani, K., Warwick, K. & Warwick, K. (eds.). Setúbal: SCITEPRESS-Science and Technology Publications, Lda., p. 31-39 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
35 Downloads (Pure)

Faster SeaSign signatures through improved rejection sampling

Decru, T., Panny, L. & Vercauteren, F., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 271-285 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Fast secure comparison for medium-sized integers and its application in binarized neural networks

Abspoel, M., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 1 Jan 2019, Topics in Cryptology – CT-RSA 2019 - The Cryptographers’ Track at the RSA Conference 2019, Proceedings. Matsui, M. (ed.). Cham: Springer, p. 453-472 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11405 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Finding closest lattice vectors using approximate voronoi cells

Doulgerakis, E., Laarhoven, T. & de Weger, B., 1 Jan 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 3-22 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Hamiltonicity below Dirac’s condition

Jansen, B. M. P., Kozma, L. & Nederlof, J., 12 Sep 2019, Graph-Theoretic Concepts in Computer Science - 45th International Workshop, WG 2019, Revised Papers. Sau, I. & Thilikos, D. M. (eds.). Cham: Springer, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11789 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Nearest neighbor decoding for Tardos fingerprinting codes

Laarhoven, T. M. M., 2 Jul 2019, IH and MMSec 2019 - Proceedings of the ACM Workshop on Information Hiding and Multimedia Security. New York: Association for Computing Machinery, Inc, p. 182-187 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Nearly ETH-tight algorithms for planar Steiner Tree with terminals on few faces

Kisfaludi-Bak, S., Nederlof, J. & van Leeuwen, E. J., 2019, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Chan, T. M. (ed.). New York: Association for Computing Machinery, Inc, p. 1015-1034 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
3 Citations (Scopus)

On a generalization of iterated and randomized rounding

Bansal, N., 23 Jun 2019, STOC 2019 - Proceedings of the 51st Annual ACM SIGACT Symposium on Theory of Computing. Charikar, M. & Cohen, E. (eds.). New York: Association for Computing Machinery, Inc, p. 1125-1135 11 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

On geometric set cover for orthants

Bringmann, K., Kisfaludi-Bak, S., Pilipczuk, M. & van Leeuwen, E. J., 1 Sep 2019, 27th Annual European Symposium on Algorithms, ESA 2019. Bender, M. A., Svensson, O. & Herman, G. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 18 p. 26. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
7 Downloads (Pure)

On the discrepancy of random low degree set systems

Bansal, N. & Meka, R., 2019, Proceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms. Chan, T. M. (ed.). New York: Association for Computing Machinery, Inc, p. 2557-2564 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
1 Citation (Scopus)

Quantum BCH and reed-solomon entanglement-assisted codes

Fernandes Pereira, F. & Pellikaan, R., 2019, Proceedings of the 40th WIC Symposium on Information Theory in the Benelux . p. 102 1 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Quantum circuits for the CSIDH: optimizing quantum evaluation of isogenies

Bernstein, D. J., Lange, T., Martindale, C. & Panny, L., 24 Apr 2019, Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Rijmen, V. & Ishai, Y. (eds.). Cham: Springer, p. 409-441 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11477 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
8 Citations (Scopus)
57 Downloads (Pure)

Quantum Indistinguishability of random sponges

Czajkowski, J., Hülsing, A. & Schaffner, C., 1 Jan 2019, Advances in Cryptology – CRYPTO 2019 - 39th Annual International Cryptology Conference, Proceedings. Boldyreva, A. & Micciancio, D. (eds.). Cham: Springer, p. 296-325 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11693 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Revenue maximization in an optical router node using multiple wavelengths

Abidini, M. A., Boxma, O., Hurkens, C., Koonen, T. & Resing, J., 12 Mar 2019, Proceedings of the 12th EAI International Conference on Performance Evaluation Methodologies and Tools, VALUETOOLS 2019. Association for Computing Machinery, Inc, p. 47-53 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Round5: compact and fast post-quantum public-key encryption

Baan, H., Bhattacharya, S., Fluhrer, S., Garcia-Morchon, O., Laarhoven, T. M. M., Rietman, R., Saarinen, M. J. O., Tolhuizen, L. & Zhang, Z., 14 Jul 2019, Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Revised Selected Papers. Ding, J. & Steinwandt, R. (eds.). Cham: Springer, p. 83-102 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11505 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

The SPHINCS+ signature framework

Bernstein, D. J., Hülsing, A., Kölbl, S., Niederhagen, R., Rijneveld, J. & Schwabe, P., 6 Nov 2019, CCS 2019 - Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: Association for Computing Machinery, Inc, p. 2129-2146 18 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
1 Citation (Scopus)
21 Downloads (Pure)

Tighter proofs of CCA security in the quantum random oracle model

Bindel, N., Hamburg, M., Hövelmanns, K., Hülsing, A. & Persichetti, E., 22 Nov 2019, Theory of Cryptography - 17th International Conference, TCC 2019, Proceedings. Hofheinz, D. & Rosen, A. (eds.). Berlin: Springer, Vol. 2. p. 61-90 30 p. (Lecture notes in computer science; vol. 11892)(Security and cryptology; vol. 11892).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Tiny wireguard tweak

Appelbaum, J. R., Martindale, C. R. & Wu, S. P., 1 Jan 2019, Progress in Cryptology – AFRICACRYPT 2019 - 11th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Buchmann, J. (eds.). Cham: Springer, p. 3-20 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11627 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2018

A tight lower bound for counting Hamiltonian cycles via matrix rank

Curticapean, R., Lindze, N. & Nederlof, J., 1 Jan 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. New York: Association for Computing Machinery, Inc, p. 1080-1099 20 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
3 Citations (Scopus)

Competitive algorithms for generalized k-server in uniform metrics.

Bansal, N., Elias, M., Koumoutsos, G. & Nederlof, J., 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. Czumaj, A. (ed.). s.l.: Society for Industrial and Applied Mathematics (SIAM), p. 992-1001 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
4 Citations (Scopus)
57 Downloads (Pure)

Computing the chromatic number using graph decompositions via matrix rank

Jansen, B. M. P. & Nederlof, J., 1 Aug 2018, 26th European Symposium on Algorithms, ESA 2018. Bast, H., Herman, G. & Azar, Y. (eds.). Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 15 p. 47. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 112).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
20 Downloads (Pure)

CSIDH: An efficient post-quantum commutative group action

Castryck, W., Lange, T., Martindale, C., Panny, L. & Renes, J., 1 Jan 2018, Advances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Peyrin, T. & Galbraith, S. (eds.). Berlin: Springer, p. 395-427 33 p. (Lecture Notes in Computer Science; vol. 11274).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

25 Citations (Scopus)

Graph-based time-space trade-offs for approximate near neighbors

Laarhoven, T., 24 May 2018, 34th International Symposium on Computational Geometry, SoCG 2018. Speckmann, B. & Toth, C. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Vol. 99. p. 1-14 57. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 99).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
2 Citations (Scopus)
16 Downloads (Pure)

HILA5 pindakaas: on the CCA security of lattice-based encryption with error correction

Bernstein, D. J., Groot Bruinderink, L., Lange, T. & Panny, L., 1 Jan 2018, Progress in Cryptology - AFRICACRYPT 2018: 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7–9, 2018, Proceedings. Joux, A., Nitaj, A. & Rachidi, T. (eds.). Dordrecht: Springer, p. 203-216 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
6 Citations (Scopus)
2 Downloads (Pure)

Improved bounds for multipass pairing heaps and path-balanced binary search trees

Dorfman, D., Kaplan, H., Kozma, L., Pettie, S. & Zwick, U., 1 Aug 2018, 26th European Symposium on Algorithms, ESA 2018. Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 1-13 13 p. 24

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
10 Downloads (Pure)

More consequences of falsifying SETH and the orthogonal vectors conjecture

Abboud, A., Dell, H., Bringmann, K. & Nederlof, J., 20 Jun 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. New York: Association for Computing Machinery, Inc, p. 253-266 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

7 Citations (Scopus)

Nested convex bodies are chaseable

Bansal, N., Bohm, M., Elias, M., Koumoutsos, G. & Umboh, S. W., 2018, 29th Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2018. Czumaj, A. (ed.). s.l.: Society for Industrial and Applied Mathematics (SIAM), p. 1253-1260 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Citations (Scopus)
80 Downloads (Pure)

Non-monochromatic and conflict-free coloring on tree spaces and planar network spaces

Aronov, B., de Berg, M., Markovic, A. & Woeginger, G., 29 Jun 2018, Computing and Combinatorics - 24th International Conference, COCOON 2018, Proceedings. Zhu, D. & Wang, L. (eds.). Springer, p. 567-578 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10976 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Downloads (Pure)

On directed feedback vertex set parameterized by treewidth

Bonamy, M., Kowalik, Ł., Nederlof, J., Pilipczuk, M., Socała, A. & Wrochna, M., 1 Jan 2018, Graph-Theoretic Concepts in Computer Science - 44th International Workshop, WG 2018, Proceedings. Brandstädt, A., Köhler, E. & Meer, K. (eds.). Springer, p. 65-78 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11159 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

2 Citations (Scopus)

Packing sporadic real-time tasks on identical multiprocessor systems

Chen, J. J., Bansal, N., Chakraborty, S. & Von Der Brüggen, G., 1 Dec 2018, 29th International Symposium on Algorithms and Computation, ISAAC 2018. Hsu, W-L., Lee, D-T. & Liao, C-S. (eds.). Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 14 p. 71. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 123).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
10 Downloads (Pure)

Pairing-friendly twisted Hessian curves

Chuengsatiansup, C. & Martindale, C. R., 2018, Progress in Cryptology - INDOCRYPT 2018: Asymmetic Key Cryptography and Cryptanalysis. Chakraborty, D. & Iwata, T. (eds.). Berlin: Springer, p. 228-247 20 p. (Lecture Notes in Computer Science; vol. 11356).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

1 Citation (Scopus)

Pairing heaps: the forward variant

Dorfman, D., Kaplan, H., Kozma, L. & Zwick, U., 1 Aug 2018, 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018. Potapov, I., Worrell, J. & Spirakis, P. (eds.). Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 14 p. 13. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 117).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
15 Downloads (Pure)

Partitioning vectors into quadruples: Worst-case analysis of a matching-based algorithm

Ficker, A. M. C., Erlebach, T., Mihalák, M. & Spieksma, F. C. R., 1 Dec 2018, Partitioning Vectors into Quadruples: Worst-Case Analysis of a Matching-Based Algorithm. Hsu, W-L., Lee, D-T. & Liao, C-S. (eds.). Wadern: Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 12 p. 45. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 123).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
9 Downloads (Pure)

Post-quantum security of the sponge construction

Czajkowski, J., Groot Bruinderink, L., Hülsing, A., Schaffner, C. & Unruh, D., 1 Jan 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Springer, p. 185-204 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

9 Citations (Scopus)

Progressive lattice sieving

Laarhoven, T. & Mariano, A., 1 Jan 2018, Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Dordrecht: Springer, p. 292-311 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

10 Citations (Scopus)

Quasi-PTAS for scheduling with precedences using LP hierarchies

Garg, S., 1 Jul 2018, 45th International Colloquium on Automata, Languages, and Programming, ICALP 2018. Chatzigiannakis, I., Kaklamanis, C., Marx, D. & Sannella, D. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Vol. 107. 13 p. 9063

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

Open Access
File
3 Citations (Scopus)
9 Downloads (Pure)

Rounded Gaussians: fast and secure constant-time sampling for lattice-based crypto

Hülsing, A., Lange, T. & Smeets, K., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Berlin: Springer, p. 728-757 30 p. (Lecture Notes in Computer Science; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

4 Citations (Scopus)

Smooth heaps and a dual view of self-Adjusting data structures

Kozma, L. & Saranurak, T., 20 Jun 2018, STOC 2018 - Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing. New York: Association for Computing Machinery, Inc, p. 801-814 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

SOFIA: MQ-based signatures in the QROM

Chen, M. S., Hülsing, A., Rijneveld, J., Samardjiska, S. & Schwabe, P., 2018, Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Abdalla, M. & Dahab, R. (eds.). Springer, p. 3-33 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10769 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

5 Citations (Scopus)

Speed-ups and time–memory trade-offs for tuple lattice sieving

Herold, G., Kirshanova, E. & Laarhoven, T., 1 Mar 2018, Public-Key Cryptography – PKC 2018: 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I. Abdalla, M. & Dahab, R. (eds.). Dordrecht: Springer, p. 407-436 (LNCS; vol. 10769).

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review