• AddressShow on map

    Postbus 513, MF

    5600MB Eindhoven

    Netherlands

Filter
Conference contribution

Search results

  • 2024

    Batch Signatures, Revisited.

    Melchor, C. A., Albrecht, M. R., Bailleux, T., Bindel, N., Howe, J., Hülsing, A., Joseph, D. & Manzano, M., 2024, Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings. Oswald, E. (ed.). p. 163-186 24 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • On Round Elimination for Special-Sound Multi-round Identification and the Generality of the Hypercube for MPCitH

    Hülsing, A., Joseph, D., Majenz, C. & Narayanan, A. K., 16 Aug 2024, Advances in Cryptology – CRYPTO 2024. Reyzin, L. & Stebila, D. (eds.). p. 373-408 36 p. (Lecture Notes in Computer Science; vol. 14920).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2023

    Algebraic Algorithm for the Alternating Trilinear Form Equivalence Problem

    Ran, L., Samardjiska, S. & Trimoska, M., 2023, Code-Based Cryptography - 11th International Workshop, CBCrypto 2023, Revised Selected Papers. Esser, A. & Santini, P. (eds.). p. 84-103 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14311 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
  • Concrete Analysis of Quantum Lattice Enumeration

    Bai, S., van Hoof, M. I., Johnson, F. B., Lange, T. & Ngo, T., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Springer, p. 131-166 36 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14440 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • Disorientation Faults in CSIDH

    Banegas, G., Krämer, J., Lange, T., Meyer, M., Panny, L., Reijnders, K., Sotáková, J. & Trimoska, M., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). Springer, p. 310-342 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • Duality and LP Bounds for Codes with Locality

    Gruica, A., Jany, B. & Ravagnani, A., 28 Apr 2023, 2023 IEEE Information Theory Workshop, ITW 2023. IEEE/LEOS, p. 347-352 6 p. 10161676

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Efficient Extended GCD and Class Groups from Secure Integer Arithmetic

    Schoenmakers, B. & Segers, T., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer, p. 32-48 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Failing Gracefully: Decryption Failures and the Fujisaki-Okamoto Transform

    Hövelmanns, K., Hülsing, A. & Majenz, C., 2023, Advances in Cryptology -- ASIACRYPT 2022. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 414-443 30 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Fixing and Mechanizing the Security Proof of Fiat-Shamir with Aborts and Dilithium

    Barbosa, M., Barthe, G., Doczkal, C., Don, J., Fehr, S., Grégoire, B., Huang, Y.-H., Hülsing, A., Lee, Y. & Wu, X., 2023, Advances in Cryptology – CRYPTO 2023 : 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, Vol. 5. p. 358-389 32 p. (Lecture Notes in Computer Science; vol. 14085).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    6 Citations (Scopus)
  • Machine-Checked Security for XMSS as in RFC 8391 and SPHINCS+

    Barbosa, M., Dupressoir, F., Grégoire, B., Hülsing, A., Meijers, M. & Strub, P.-Y., 2023, Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V. Handschuh, H. & Lysyanskaya, A. (eds.). Cham: Springer, p. 421-454 34 p. (Lecture Notes in Computer Science; vol. 14085).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • New Approach for Sine and Cosine in Secure Fixed-Point Arithmetic

    Korzilius, S. & Schoenmakers, B., 2023, Cyber Security, Cryptology, and Machine Learning - 7th International Symposium, CSCML 2023, Proceedings. Dolev, S., Gudes, E. & Paillier, P. (eds.). Springer, p. 307-319 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13914 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Practical key-recovery attack on MQ-Sign and more

    Aulbach, T., Samardjiska, S. & Trimoska, M., 2023, (Accepted/In press) PQCrypto 2024.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Recovering the Tight Security Proof of SPHINCS+

    Hülsing, A. & Kudinov, M., Jan 2023, Advances in Cryptology – ASIACRYPT 2022: 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2022, Proceedings, Part IV. Agrawal, S. & Lin, D. (eds.). Cham: Springer Nature, p. 3-33 31 p. (Lecture Notes in Computer Science (LNCS); vol. 13794).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    5 Citations (Scopus)
  • SDitH in the QROM

    Melchor, C. A., Hülsing, A., Joseph, D., Majenz, C., Ronen, E. & Yue, D., 2023, Advances in Cryptology – ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Guo, J. & Steinfeld, R. (eds.). Cham, p. 317-350 34 p. (Lecture Notes in Computer Science (LNCS; vol. 14444).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • SPHINCS+C: Compressing SPHINCS+ With (Almost) No Cost.

    Hülsing, A., Kudinov, M., Ronen, E. & Yogev, E., 2023, Proceedings - 44th IEEE Symposium on Security and Privacy, SP 2023. Institute of Electrical and Electronics Engineers, p. 1435-1453 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • The Return of the SDitH

    Melchor, C. A., Gama, N., Howe, J., Hülsing, A., Joseph, D. & Yue, D., 2023, Advances in Cryptology – EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Hazay, C. & Stam, M. (eds.). p. 564-596 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14008 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
  • The Role of the Alphabet in Network Coding: An Optimization Approach

    Hojny, C., Kiliç, A. B. & Ravagnani, A., 2023, 2023 IEEE Information Theory Workshop, ITW 2023. Institute of Electrical and Electronics Engineers, p. 526-531 6 p. 10161662

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Towards Transparent Cheat Detection in Online Chess: An Application of Human and Computer Decision-Making Preferences

    Laarhoven, T. & Ponukumati, A., 2023, Computers and Games - International Conference, CG 2022, Revised Selected Papers. Browne, C., Kishimoto, A. & Schaeffer, J. (eds.). Springer, p. 163-180 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13865 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • 2022

    Formal Verification of Saber's Public-Key Encryption Scheme in EasyCrypt.

    Hülsing, A., Meijers, M. & Strub, P.-Y., 2022, Advances in Cryptology – CRYPTO 2022 - 42nd Annual International Cryptology Conference, CRYPTO 2022, Proceedings. Dodis, Y. & Shrimpton, T. (eds.). p. 622-653 32 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13507 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Isolation Schemes for Problems on Decomposable Graphs.

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 1 Mar 2022, 39th International Symposium on Theoretical Aspects of Computer Science, STACS 2022. Berenbrink, P. & Monmege, B. (eds.). p. 50:1-50:20 20 p. 50. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 219).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Package Delivery Using Drones with Restricted Movement Areas

    Erlebach, T., Luo, K. & Spieksma, F. C. R., 1 Dec 2022, 33rd International Symposium on Algorithms and Computation, ISAAC 2022. Bae, S. W. & Park, H. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 49. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 248).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Post Quantum Noise.

    Angel, Y., Dowling, B., Hülsing, A., Schwabe, P. & Weber, F., 7 Nov 2022, CCS 2022 - Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. p. 97-109 13 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    4 Citations (Scopus)
  • 2021

    Authenticated Key Exchange and Signatures with Tight Security in the Standard Model.

    Han, S., Jager, T., Kiltz, E., Liu, S., Pan, J., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). p. 670-700 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12828 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    14 Citations (Scopus)
  • Dual Lattice Attacks for Closest Vector Problems (with Preprocessing).

    Laarhoven, T. & Walter, M., 2021, Topics in Cryptology-CT-RSA 2021 - Cryptographers’ Track at the RSA Conference, Proceedings. Paterson, K. G. (ed.). p. 478-502 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12704 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    2 Citations (Scopus)
  • Efficient Secure Ridge Regression from Randomized Gaussian Elimination

    Blom, F., Bouman, N. J., Schoenmakers, B. & de Vreede, N., 2021, Cyber Security Cryptography and Machine Learning - 5th International Symposium, CSCML 2021, Proceedings. Dolev, S., Margalit, O., Pinkas, B. & Schwarzmann, A. (eds.). Springer, p. 301-316 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12716 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    3 Citations (Scopus)
  • Epochal Signatures for Deniable Group Chats

    Hülsing, A. & Weber, F., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 1677-1695 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    1 Citation (Scopus)
  • Faster Lattice-Based KEMs via a Generic Fujisaki-Okamoto Transform Using Prefix Hashing

    Duman, J., Hövelmanns, K., Kiltz, E., Lyubashevsky, V. & Seiler, G., 12 Nov 2021, CCS 2021 - Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 2722-2737 16 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    11 Citations (Scopus)
  • Improving Schroeppel and Shamir's algorithm for subset sum via orthogonal vectors

    Nederlof, J. & Wegrzycki, K., 15 Jun 2021, STOC 2021 - Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing. Khuller, S. & Williams, V. V. (eds.). p. 1670-1683 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
  • Lower Bounds on Lattice Sieving and Information Set Decoding.

    Kirshanova, E. & Laarhoven, T., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer, p. 791-820 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • On the Impossibility of Purely Algebraic Signatures.

    Döttling, N., Hartmann, D., Hofheinz, D., Kiltz, E., Schäge, S. & Ursu, B., 2021, Theory of Cryptography - 19th International Conference, TCC 2021, Proceedings. Nissim, K., Waters, B. & Waters, B. (eds.). p. 317-349 33 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13044 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    6 Citations (Scopus)
  • Post-Quantum WireGuard

    Hülsing, A., Ning, K., Schwabe, P., Weber, F. & Zimmermann, P. R., 1 May 2021, Proceedings - 2021 IEEE Symposium on Security and Privacy, SP 2021. Los Alamitos, CA, USA: IEEE Computer Society, p. 304-321 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    28 Citations (Scopus)
  • The Typical Non-Linear Code over Large Alphabets

    Gruica, A. & Ravagnani, A., 2021, 2021 IEEE Information Theory Workshop, ITW 2021 - Proceedings. Institute of Electrical and Electronics Engineers

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    1 Citation (Scopus)
  • Tight Adaptive Reprogramming in the QROM

    Grilo, A. B., Hövelmanns, K., Hülsing, A. & Majenz, C., 2021, Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings. Tibouchi, M. & Wang, H. (eds.). Cham: Springer, Vol. 1. p. 637-667 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13090 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    9 Citations (Scopus)
  • Tightly-Secure Authenticated Key Exchange, Revisited.

    Jager, T., Kiltz, E., Riepel, D. & Schäge, S., 2021, Advances in Cryptology – EUROCRYPT 2021 - 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Standaert, F.-X. (eds.). p. 117-146 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12696 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    7 Citations (SciVal)
  • Verifying Post-Quantum Signatures in 8 kB of RAM.

    Gonzalez, R., Hülsing, A., Kannwischer, M. J., Krämer, J., Lange, T., Stöttinger, M., Waitz, E., Wiggers, T. & Yang, B.-Y., 2021, Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Proceedings. Cheon, J. H. & Tillich, J.-P. (eds.). p. 215-233 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12841 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    8 Citations (Scopus)
  • 2020

    Approximation Algorithms for Car-Sharing Problems

    Luo, K. & Spieksma, F. C. R., 2020, Computing and Combinatorics - 26th International Conference, COCOON 2020, Proceedings. Kim, D., Uma, R. N., Cai, Z. & Lee, D. H. (eds.). Springer, p. 262-273 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12273 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    5 Citations (Scopus)
  • A Practical Approach to the Secure Computation of the Moore–Penrose Pseudoinverse over the Rationals

    Bouman, N. J. & de Vreede, N., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer, p. 398-417 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Detecting feedback vertex sets of size K in O*(2.7k) time

    Li, J. & Nederlof, J., 2020, 31st Annual ACM-SIAM Symposium on Discrete Algorithms, SODA 2020. Chawla, S. (ed.). Association for Computing Machinery, Inc, p. 971-989 19 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Generalized Matsui Algorithm 1 with Application for the Full DES

    Ashur, T., Posteuca, R., Šijačić, D. & D’haeseleer, S., 2020, Security and Cryptography for Networks. SCN 2020. Galdi, C. & Kolesnikov, V. (eds.). Springer, p. 448-467 20 p. (Lecture notes in computer science; vol. 12238)(Security and Cryptology; vol. 12238).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    1 Citation (Scopus)
    49 Downloads (Pure)
  • Generic Authenticated Key Exchange in the Quantum Random Oracle Model.

    Hövelmanns, K., Kiltz, E., Schäge, S. & Unruh, D., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). p. 389-422 34 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    26 Citations (Scopus)
  • Hamiltonian Cycle Parameterized by Treedepth in Single Exponential Time and Polynomial Space

    Nederlof, J., Pilipczuk, M., Swennenhuis, C. M. F. & Wegrzycki, K., 2020, Graph-Theoretic Concepts in Computer Science: 46th International Workshop, WG 2020, Leeds, UK, June 24–26, 2020, Revised Selected Papers. Adler, I. & Müller, H. (eds.). Springer, p. 27-39 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12301 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    13 Citations (Scopus)
  • McTiny: Fast high-confidence post-quantum key erasure for tiny network servers

    Bernstein, D. J. & Lange, T., 2020, Proceedings of the 29th USENIX Security Symposium. Usenix Association, p. 1731-1748 18 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    2 Citations (Scopus)
  • Online vector balancing and geometric discrepancy

    Bansal, N., Jiang, H., Singla, S. & Sinha, M., 8 Jun 2020, STOC 2020 - Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing. Makarychev, K., Makarychev, Y., Tulsiani, M., Kamath, G. & Chuzhoy, J. (eds.). Association for Computing Machinery, Inc, p. 1139-1152 14 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    17 Citations (Scopus)
  • On the Fine-Grained Parameterized Complexity of Partial Scheduling to Minimize the Makespan.

    Nederlof, J. & Swennenhuis, C. M. F., Dec 2020, 15th International Symposium on Parameterized and Exact Computation (IPEC 2020). Cao, Y. & Pilipczuk, M. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 25:1-25:17 25. (Leibniz International Proceedings in Informatics (LIPIcs); vol. 180).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Polytopes, lattices, and spherical codes for the nearest neighbor problem

    Laarhoven, T., 1 Jun 2020, 47th International Colloquium on Automata, Languages, and Programming, ICALP 2020. Czumaj, A., Dawar, A. & Merelli, E. (eds.). Schloss Dagstuhl - Leibniz-Zentrum für Informatik, p. 76:1-76:14 14 p. 76. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 168).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

  • Prelude to Marvellous: With the Designers' Commentary, Two Bonus Tracks, and a Foretold Prophecy

    Ashur, T. & Dhooghe, S., Aug 2020, The Conference for Failed Approaches and Insightful Losses in Cryptology: CFail 2020. 26 p.

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    44 Downloads (Pure)
  • Privacy-Preserving Authenticated Key Exchange and the Case of IKEv2.

    Schäge, S., Schwenk, J. & Lauer, S., 2020, Public-Key Cryptography – PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. Kiayias, A., Kohlweiss, M., Wallden, P. & Zikas, V. (eds.). p. 567-596 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12111 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    3 Citations (Scopus)
  • Rational Isogenies from Irrational Endomorphisms

    Castryck, W., Panny, L. & Vercauteren, F., 2020, Advances in Cryptology – EUROCRYPT 2020 - 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Canteaut, A. & Ishai, Y. (eds.). Springer, p. 523-548 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12106 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    15 Citations (Scopus)
  • Rotational Cryptanalysis on MAC Algorithm Chaskey

    Kraleva, L., Ashur, T. & Rijmen, V., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings: ACNS 2020. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer, p. 153-168 16 p. (Lecture Notes in Computer Science ; vol. 12146).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    4 Citations (Scopus)
    37 Downloads (Pure)
  • Rotational-XOR Cryptanalysis of Simon-like Block Ciphers

    Lu, J., Liu, Y., Ashur, T., Sun, B. & Li, C., 2020, Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Proceedings. Liu, J. K. & Cui, H. (eds.). Springer, Vol. 12248. p. 105-124 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12248 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    13 Citations (Scopus)
    75 Downloads (Pure)